527 lines
14 KiB
Go
527 lines
14 KiB
Go
package tests_test
|
|
|
|
import (
|
|
"sigs.k8s.io/kustomize/v3/k8sdeps/kunstruct"
|
|
"sigs.k8s.io/kustomize/v3/k8sdeps/transformer"
|
|
"sigs.k8s.io/kustomize/v3/pkg/fs"
|
|
"sigs.k8s.io/kustomize/v3/pkg/loader"
|
|
"sigs.k8s.io/kustomize/v3/pkg/plugins"
|
|
"sigs.k8s.io/kustomize/v3/pkg/resmap"
|
|
"sigs.k8s.io/kustomize/v3/pkg/resource"
|
|
"sigs.k8s.io/kustomize/v3/pkg/target"
|
|
"sigs.k8s.io/kustomize/v3/pkg/validators"
|
|
"testing"
|
|
)
|
|
|
|
func writeJupyterWebAppOverlaysApplication(th *KustTestHarness) {
|
|
th.writeF("/manifests/jupyter/jupyter-web-app/overlays/application/application.yaml", `
|
|
apiVersion: app.k8s.io/v1beta1
|
|
kind: Application
|
|
metadata:
|
|
name: jupyter-web-app
|
|
spec:
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/name: jupyter-web-app
|
|
app.kubernetes.io/instance: jupyter-web-app-v0.7.0
|
|
app.kubernetes.io/managed-by: kfctl
|
|
app.kubernetes.io/component: jupyter-web-app
|
|
app.kubernetes.io/part-of: kubeflow
|
|
app.kubernetes.io/version: v0.7.0
|
|
componentKinds:
|
|
- group: core
|
|
kind: ConfigMap
|
|
- group: apps
|
|
kind: Deployment
|
|
- group: rbac.authorization.k8s.io
|
|
kind: RoleBinding
|
|
- group: rbac.authorization.k8s.io
|
|
kind: Role
|
|
- group: core
|
|
kind: ServiceAccount
|
|
- group: core
|
|
kind: Service
|
|
- group: networking.istio.io
|
|
kind: VirtualService
|
|
descriptor:
|
|
type: jupyter-web-app
|
|
version: v1beta1
|
|
description: Provides a UI which allows the user to create/conect/delete jupyter notebooks.
|
|
maintainers:
|
|
- name: Kimonas Sotirchos
|
|
email: kimwnasptd@arrikto.com
|
|
owners:
|
|
- name: Kimonas Sotirchos
|
|
email: kimwnasptd@arrikto.com
|
|
keywords:
|
|
- jupyterhub
|
|
- jupyter ui
|
|
- notebooks
|
|
links:
|
|
- description: About
|
|
url: https://github.com/kubeflow/kubeflow/tree/master/components/jupyter-web-app
|
|
- description: Docs
|
|
url: https://www.kubeflow.org/docs/notebooks
|
|
addOwnerRef: true
|
|
|
|
`)
|
|
th.writeK("/manifests/jupyter/jupyter-web-app/overlays/application", `
|
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
|
kind: Kustomization
|
|
bases:
|
|
- ../../base
|
|
resources:
|
|
- application.yaml
|
|
commonLabels:
|
|
app.kubernetes.io/name: jupyter-web-app
|
|
app.kubernetes.io/instance: jupyter-web-app-v0.7.0
|
|
app.kubernetes.io/managed-by: kfctl
|
|
app.kubernetes.io/component: jupyter-web-app
|
|
app.kubernetes.io/part-of: kubeflow
|
|
app.kubernetes.io/version: v0.7.0
|
|
`)
|
|
th.writeF("/manifests/jupyter/jupyter-web-app/base/cluster-role-binding.yaml", `
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
name: cluster-role-binding
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: cluster-role
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: service-account
|
|
`)
|
|
th.writeF("/manifests/jupyter/jupyter-web-app/base/cluster-role.yaml", `
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRole
|
|
metadata:
|
|
name: cluster-role
|
|
rules:
|
|
- apiGroups:
|
|
- ""
|
|
resources:
|
|
- namespaces
|
|
verbs:
|
|
- get
|
|
- list
|
|
- create
|
|
- delete
|
|
- apiGroups:
|
|
- authorization.k8s.io
|
|
resources:
|
|
- subjectaccessreviews
|
|
verbs:
|
|
- create
|
|
- apiGroups:
|
|
- kubeflow.org
|
|
resources:
|
|
- notebooks
|
|
- notebooks/finalizers
|
|
- poddefaults
|
|
verbs:
|
|
- get
|
|
- list
|
|
- create
|
|
- delete
|
|
- apiGroups:
|
|
- ""
|
|
resources:
|
|
- persistentvolumeclaims
|
|
verbs:
|
|
- create
|
|
- delete
|
|
- get
|
|
- list
|
|
- apiGroups:
|
|
- ""
|
|
resources:
|
|
- events
|
|
verbs:
|
|
- list
|
|
- apiGroups:
|
|
- storage.k8s.io
|
|
resources:
|
|
- storageclasses
|
|
verbs:
|
|
- get
|
|
- list
|
|
- watch
|
|
`)
|
|
th.writeF("/manifests/jupyter/jupyter-web-app/base/config-map.yaml", `
|
|
apiVersion: v1
|
|
data:
|
|
spawner_ui_config.yaml: |
|
|
# Configuration file for the Jupyter UI.
|
|
#
|
|
# Each Jupyter UI option is configured by two keys: 'value' and 'readOnly'
|
|
# - The 'value' key contains the default value
|
|
# - The 'readOnly' key determines if the option will be available to users
|
|
#
|
|
# If the 'readOnly' key is present and set to 'true', the respective option
|
|
# will be disabled for users and only set by the admin. Also when a
|
|
# Notebook is POSTED to the API if a necessary field is not present then
|
|
# the value from the config will be used.
|
|
#
|
|
# If the 'readOnly' key is missing (defaults to 'false'), the respective option
|
|
# will be available for users to edit.
|
|
#
|
|
# Note that some values can be templated. Such values are the names of the
|
|
# Volumes as well as their StorageClass
|
|
spawnerFormDefaults:
|
|
image:
|
|
# The container Image for the user's Jupyter Notebook
|
|
# If readonly, this value must be a member of the list below
|
|
value: gcr.io/kubeflow-images-public/tensorflow-1.14.0-notebook-cpu:v-base-ef41372-1177829795472347138
|
|
# The list of available standard container Images
|
|
options:
|
|
- gcr.io/kubeflow-images-public/tensorflow-1.14.0-notebook-cpu:v0.7.0
|
|
- gcr.io/kubeflow-images-public/tensorflow-1.14.0-notebook-gpu:v0.7.0
|
|
- gcr.io/kubeflow-images-public/tensorflow-2.0.0a0-notebook-cpu:v0.7.0
|
|
- gcr.io/kubeflow-images-public/tensorflow-2.0.0a0-notebook-gpu:v0.7.0
|
|
# By default, custom container Images are allowed
|
|
# Uncomment the following line to only enable standard container Images
|
|
readOnly: false
|
|
cpu:
|
|
# CPU for user's Notebook
|
|
value: '0.5'
|
|
readOnly: false
|
|
memory:
|
|
# Memory for user's Notebook
|
|
value: 1.0Gi
|
|
readOnly: false
|
|
workspaceVolume:
|
|
# Workspace Volume to be attached to user's Notebook
|
|
# Each Workspace Volume is declared with the following attributes:
|
|
# Type, Name, Size, MountPath and Access Mode
|
|
value:
|
|
type:
|
|
# The Type of the Workspace Volume
|
|
# Supported values: 'New', 'Existing'
|
|
value: New
|
|
name:
|
|
# The Name of the Workspace Volume
|
|
# Note that this is a templated value. Special values:
|
|
# {notebook-name}: Replaced with the name of the Notebook. The frontend
|
|
# will replace this value as the user types the name
|
|
value: 'workspace-{notebook-name}'
|
|
size:
|
|
# The Size of the Workspace Volume (in Gi)
|
|
value: '10Gi'
|
|
mountPath:
|
|
# The Path that the Workspace Volume will be mounted
|
|
value: /home/jovyan
|
|
accessModes:
|
|
# The Access Mode of the Workspace Volume
|
|
# Supported values: 'ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany'
|
|
value: ReadWriteOnce
|
|
class:
|
|
# The StrageClass the PVC will use if type is New. Special values are:
|
|
# {none}: default StorageClass
|
|
# {empty}: empty string ""
|
|
value: '{none}'
|
|
readOnly: false
|
|
dataVolumes:
|
|
# List of additional Data Volumes to be attached to the user's Notebook
|
|
value: []
|
|
# Each Data Volume is declared with the following attributes:
|
|
# Type, Name, Size, MountPath and Access Mode
|
|
#
|
|
# For example, a list with 2 Data Volumes:
|
|
# value:
|
|
# - value:
|
|
# type:
|
|
# value: New
|
|
# name:
|
|
# value: '{notebook-name}-vol-1'
|
|
# size:
|
|
# value: '10Gi'
|
|
# class:
|
|
# value: standard
|
|
# mountPath:
|
|
# value: /home/jovyan/vol-1
|
|
# accessModes:
|
|
# value: ReadWriteOnce
|
|
# class:
|
|
# value: {none}
|
|
# - value:
|
|
# type:
|
|
# value: New
|
|
# name:
|
|
# value: '{notebook-name}-vol-2'
|
|
# size:
|
|
# value: '10Gi'
|
|
# mountPath:
|
|
# value: /home/jovyan/vol-2
|
|
# accessModes:
|
|
# value: ReadWriteMany
|
|
# class:
|
|
# value: {none}
|
|
readOnly: false
|
|
extraResources:
|
|
# Extra Resource Limits for user's Notebook
|
|
# e.x. "{'nvidia.com/gpu': 2}"
|
|
value: "{}"
|
|
readOnly: false
|
|
shm:
|
|
value: true
|
|
readOnly: false
|
|
configurations:
|
|
# List of labels to be selected, these are the labels from PodDefaults
|
|
# value:
|
|
# - add-gcp-secret
|
|
# - default-editor
|
|
value: []
|
|
readOnly: false
|
|
kind: ConfigMap
|
|
metadata:
|
|
name: config
|
|
`)
|
|
th.writeF("/manifests/jupyter/jupyter-web-app/base/deployment.yaml", `
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
name: deployment
|
|
spec:
|
|
replicas: 1
|
|
template:
|
|
metadata:
|
|
annotations:
|
|
sidecar.istio.io/inject: "false"
|
|
spec:
|
|
containers:
|
|
- env:
|
|
- name: ROK_SECRET_NAME
|
|
valueFrom:
|
|
configMapKeyRef:
|
|
name: parameters
|
|
key: ROK_SECRET_NAME
|
|
- name: UI
|
|
valueFrom:
|
|
configMapKeyRef:
|
|
name: parameters
|
|
key: UI
|
|
- name: USERID_HEADER
|
|
value: $(userid-header)
|
|
- name: USERID_PREFIX
|
|
value: $(userid-prefix)
|
|
image: gcr.io/kubeflow-images-public/jupyter-web-app:v0.5.0
|
|
imagePullPolicy: $(policy)
|
|
name: jupyter-web-app
|
|
ports:
|
|
- containerPort: 5000
|
|
volumeMounts:
|
|
- mountPath: /etc/config
|
|
name: config-volume
|
|
serviceAccountName: service-account
|
|
volumes:
|
|
- configMap:
|
|
name: config
|
|
name: config-volume
|
|
`)
|
|
th.writeF("/manifests/jupyter/jupyter-web-app/base/role-binding.yaml", `
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
kind: RoleBinding
|
|
metadata:
|
|
name: jupyter-notebook-role-binding
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: Role
|
|
name: jupyter-notebook-role
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: jupyter-notebook
|
|
`)
|
|
th.writeF("/manifests/jupyter/jupyter-web-app/base/role.yaml", `
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
kind: Role
|
|
metadata:
|
|
name: jupyter-notebook-role
|
|
rules:
|
|
- apiGroups:
|
|
- ""
|
|
resources:
|
|
- pods
|
|
- pods/log
|
|
- secrets
|
|
- services
|
|
verbs:
|
|
- '*'
|
|
- apiGroups:
|
|
- ""
|
|
- apps
|
|
- extensions
|
|
resources:
|
|
- deployments
|
|
- replicasets
|
|
verbs:
|
|
- '*'
|
|
- apiGroups:
|
|
- kubeflow.org
|
|
resources:
|
|
- '*'
|
|
verbs:
|
|
- '*'
|
|
- apiGroups:
|
|
- batch
|
|
resources:
|
|
- jobs
|
|
verbs:
|
|
- '*'
|
|
`)
|
|
th.writeF("/manifests/jupyter/jupyter-web-app/base/service-account.yaml", `
|
|
apiVersion: v1
|
|
kind: ServiceAccount
|
|
metadata:
|
|
name: service-account
|
|
`)
|
|
th.writeF("/manifests/jupyter/jupyter-web-app/base/service.yaml", `
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
annotations:
|
|
getambassador.io/config: |-
|
|
---
|
|
apiVersion: ambassador/v0
|
|
kind: Mapping
|
|
name: webapp_mapping
|
|
prefix: /$(prefix)/
|
|
service: jupyter-web-app-service.$(namespace)
|
|
add_request_headers:
|
|
x-forwarded-prefix: /jupyter
|
|
labels:
|
|
run: jupyter-web-app
|
|
name: service
|
|
spec:
|
|
ports:
|
|
- name: http
|
|
port: 80
|
|
protocol: TCP
|
|
targetPort: 5000
|
|
type: ClusterIP
|
|
`)
|
|
th.writeF("/manifests/jupyter/jupyter-web-app/base/params.yaml", `
|
|
varReference:
|
|
- path: spec/template/spec/containers/imagePullPolicy
|
|
kind: Deployment
|
|
- path: metadata/annotations/getambassador.io\/config
|
|
kind: Service
|
|
- path: spec/template/spec/containers/0/env/2/value
|
|
kind: Deployment
|
|
- path: spec/template/spec/containers/0/env/3/value
|
|
kind: Deployment`)
|
|
th.writeF("/manifests/jupyter/jupyter-web-app/base/params.env", `
|
|
UI=default
|
|
ROK_SECRET_NAME=secret-rok-{username}
|
|
policy=Always
|
|
prefix=jupyter
|
|
clusterDomain=cluster.local
|
|
userid-header=
|
|
userid-prefix=`)
|
|
th.writeK("/manifests/jupyter/jupyter-web-app/base", `
|
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
|
kind: Kustomization
|
|
resources:
|
|
- cluster-role-binding.yaml
|
|
- cluster-role.yaml
|
|
- config-map.yaml
|
|
- deployment.yaml
|
|
- role-binding.yaml
|
|
- role.yaml
|
|
- service-account.yaml
|
|
- service.yaml
|
|
namePrefix: jupyter-web-app-
|
|
namespace: kubeflow
|
|
commonLabels:
|
|
app: jupyter-web-app
|
|
kustomize.component: jupyter-web-app
|
|
images:
|
|
- name: gcr.io/kubeflow-images-public/jupyter-web-app
|
|
newName: gcr.io/kubeflow-images-public/jupyter-web-app
|
|
newTag: vmaster-g56c9025a
|
|
configMapGenerator:
|
|
- envs:
|
|
- params.env
|
|
name: parameters
|
|
generatorOptions:
|
|
disableNameSuffixHash: true
|
|
vars:
|
|
- fieldref:
|
|
fieldPath: data.policy
|
|
name: policy
|
|
objref:
|
|
apiVersion: v1
|
|
kind: ConfigMap
|
|
name: parameters
|
|
- fieldref:
|
|
fieldPath: data.prefix
|
|
name: prefix
|
|
objref:
|
|
apiVersion: v1
|
|
kind: ConfigMap
|
|
name: parameters
|
|
- fieldref:
|
|
fieldPath: data.clusterDomain
|
|
name: clusterDomain
|
|
objref:
|
|
apiVersion: v1
|
|
kind: ConfigMap
|
|
name: parameters
|
|
- fieldref:
|
|
fieldPath: metadata.namespace
|
|
name: namespace
|
|
objref:
|
|
apiVersion: v1
|
|
kind: Service
|
|
name: service
|
|
- fieldref:
|
|
fieldPath: data.userid-header
|
|
name: userid-header
|
|
objref:
|
|
apiVersion: v1
|
|
kind: ConfigMap
|
|
name: parameters
|
|
- fieldref:
|
|
fieldPath: data.userid-prefix
|
|
name: userid-prefix
|
|
objref:
|
|
apiVersion: v1
|
|
kind: ConfigMap
|
|
name: parameters
|
|
configurations:
|
|
- params.yaml
|
|
`)
|
|
}
|
|
|
|
func TestJupyterWebAppOverlaysApplication(t *testing.T) {
|
|
th := NewKustTestHarness(t, "/manifests/jupyter/jupyter-web-app/overlays/application")
|
|
writeJupyterWebAppOverlaysApplication(th)
|
|
m, err := th.makeKustTarget().MakeCustomizedResMap()
|
|
if err != nil {
|
|
t.Fatalf("Err: %v", err)
|
|
}
|
|
expected, err := m.AsYaml()
|
|
if err != nil {
|
|
t.Fatalf("Err: %v", err)
|
|
}
|
|
targetPath := "../jupyter/jupyter-web-app/overlays/application"
|
|
fsys := fs.MakeRealFS()
|
|
lrc := loader.RestrictionRootOnly
|
|
_loader, loaderErr := loader.NewLoader(lrc, validators.MakeFakeValidator(), targetPath, fsys)
|
|
if loaderErr != nil {
|
|
t.Fatalf("could not load kustomize loader: %v", loaderErr)
|
|
}
|
|
rf := resmap.NewFactory(resource.NewFactory(kunstruct.NewKunstructuredFactoryImpl()), transformer.NewFactoryImpl())
|
|
pc := plugins.DefaultPluginConfig()
|
|
kt, err := target.NewKustTarget(_loader, rf, transformer.NewFactoryImpl(), plugins.NewLoader(pc, rf))
|
|
if err != nil {
|
|
th.t.Fatalf("Unexpected construction error %v", err)
|
|
}
|
|
actual, err := kt.MakeCustomizedResMap()
|
|
if err != nil {
|
|
t.Fatalf("Err: %v", err)
|
|
}
|
|
th.assertActualEqualsExpected(actual, string(expected))
|
|
}
|