/* Copyright 2015 The Kubernetes Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package v1 import ( "reflect" "testing" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/labels" "k8s.io/kubernetes/pkg/api" ) func TestAddToNodeAddresses(t *testing.T) { testCases := []struct { existing []NodeAddress toAdd []NodeAddress expected []NodeAddress }{ { existing: []NodeAddress{}, toAdd: []NodeAddress{}, expected: []NodeAddress{}, }, { existing: []NodeAddress{}, toAdd: []NodeAddress{ {Type: NodeExternalIP, Address: "1.1.1.1"}, {Type: NodeHostName, Address: "localhost"}, }, expected: []NodeAddress{ {Type: NodeExternalIP, Address: "1.1.1.1"}, {Type: NodeHostName, Address: "localhost"}, }, }, { existing: []NodeAddress{}, toAdd: []NodeAddress{ {Type: NodeExternalIP, Address: "1.1.1.1"}, {Type: NodeExternalIP, Address: "1.1.1.1"}, }, expected: []NodeAddress{ {Type: NodeExternalIP, Address: "1.1.1.1"}, }, }, { existing: []NodeAddress{ {Type: NodeExternalIP, Address: "1.1.1.1"}, {Type: NodeInternalIP, Address: "10.1.1.1"}, }, toAdd: []NodeAddress{ {Type: NodeExternalIP, Address: "1.1.1.1"}, {Type: NodeHostName, Address: "localhost"}, }, expected: []NodeAddress{ {Type: NodeExternalIP, Address: "1.1.1.1"}, {Type: NodeInternalIP, Address: "10.1.1.1"}, {Type: NodeHostName, Address: "localhost"}, }, }, } for i, tc := range testCases { AddToNodeAddresses(&tc.existing, tc.toAdd...) if !api.Semantic.DeepEqual(tc.expected, tc.existing) { t.Errorf("case[%d], expected: %v, got: %v", i, tc.expected, tc.existing) } } } func TestGetAccessModesFromString(t *testing.T) { modes := GetAccessModesFromString("ROX") if !containsAccessMode(modes, ReadOnlyMany) { t.Errorf("Expected mode %s, but got %+v", ReadOnlyMany, modes) } modes = GetAccessModesFromString("ROX,RWX") if !containsAccessMode(modes, ReadOnlyMany) { t.Errorf("Expected mode %s, but got %+v", ReadOnlyMany, modes) } if !containsAccessMode(modes, ReadWriteMany) { t.Errorf("Expected mode %s, but got %+v", ReadWriteMany, modes) } modes = GetAccessModesFromString("RWO,ROX,RWX") if !containsAccessMode(modes, ReadOnlyMany) { t.Errorf("Expected mode %s, but got %+v", ReadOnlyMany, modes) } if !containsAccessMode(modes, ReadWriteMany) { t.Errorf("Expected mode %s, but got %+v", ReadWriteMany, modes) } } func TestRemoveDuplicateAccessModes(t *testing.T) { modes := []PersistentVolumeAccessMode{ ReadWriteOnce, ReadOnlyMany, ReadOnlyMany, ReadOnlyMany, } modes = removeDuplicateAccessModes(modes) if len(modes) != 2 { t.Errorf("Expected 2 distinct modes in set but found %v", len(modes)) } } func TestNodeSelectorRequirementsAsSelector(t *testing.T) { matchExpressions := []NodeSelectorRequirement{{ Key: "foo", Operator: NodeSelectorOpIn, Values: []string{"bar", "baz"}, }} mustParse := func(s string) labels.Selector { out, e := labels.Parse(s) if e != nil { panic(e) } return out } tc := []struct { in []NodeSelectorRequirement out labels.Selector expectErr bool }{ {in: nil, out: labels.Nothing()}, {in: []NodeSelectorRequirement{}, out: labels.Nothing()}, { in: matchExpressions, out: mustParse("foo in (baz,bar)"), }, { in: []NodeSelectorRequirement{{ Key: "foo", Operator: NodeSelectorOpExists, Values: []string{"bar", "baz"}, }}, expectErr: true, }, { in: []NodeSelectorRequirement{{ Key: "foo", Operator: NodeSelectorOpGt, Values: []string{"1"}, }}, out: mustParse("foo>1"), }, { in: []NodeSelectorRequirement{{ Key: "bar", Operator: NodeSelectorOpLt, Values: []string{"7"}, }}, out: mustParse("bar<7"), }, } for i, tc := range tc { out, err := NodeSelectorRequirementsAsSelector(tc.in) if err == nil && tc.expectErr { t.Errorf("[%v]expected error but got none.", i) } if err != nil && !tc.expectErr { t.Errorf("[%v]did not expect error but got: %v", i, err) } if !reflect.DeepEqual(out, tc.out) { t.Errorf("[%v]expected:\n\t%+v\nbut got:\n\t%+v", i, tc.out, out) } } } func TestGetAffinityFromPod(t *testing.T) { testCases := []struct { pod *Pod expectErr bool }{ { pod: &Pod{}, expectErr: false, }, { pod: &Pod{ ObjectMeta: metav1.ObjectMeta{ Annotations: map[string]string{ AffinityAnnotationKey: ` {"nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [{ "matchExpressions": [{ "key": "foo", "operator": "In", "values": ["value1", "value2"] }] }] }}}`, }, }, }, expectErr: false, }, { pod: &Pod{ ObjectMeta: metav1.ObjectMeta{ Annotations: map[string]string{ AffinityAnnotationKey: ` {"nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [{ "matchExpressions": [{ "key": "foo", `, }, }, }, expectErr: true, }, } for i, tc := range testCases { _, err := GetAffinityFromPodAnnotations(tc.pod.Annotations) if err == nil && tc.expectErr { t.Errorf("[%v]expected error but got none.", i) } if err != nil && !tc.expectErr { t.Errorf("[%v]did not expect error but got: %v", i, err) } } } func TestTaintToString(t *testing.T) { testCases := []struct { taint *Taint expectedString string }{ { taint: &Taint{ Key: "foo", Value: "bar", Effect: TaintEffectNoSchedule, }, expectedString: "foo=bar:NoSchedule", }, { taint: &Taint{ Key: "foo", Effect: TaintEffectNoSchedule, }, expectedString: "foo:NoSchedule", }, } for i, tc := range testCases { if tc.expectedString != tc.taint.ToString() { t.Errorf("[%v] expected taint %v converted to %s, got %s", i, tc.taint, tc.expectedString, tc.taint.ToString()) } } } func TestMatchTaint(t *testing.T) { testCases := []struct { description string taint *Taint taintToMatch Taint expectMatch bool }{ { description: "two taints with the same key,value,effect should match", taint: &Taint{ Key: "foo", Value: "bar", Effect: TaintEffectNoSchedule, }, taintToMatch: Taint{ Key: "foo", Value: "bar", Effect: TaintEffectNoSchedule, }, expectMatch: true, }, { description: "two taints with the same key,effect but different value should match", taint: &Taint{ Key: "foo", Value: "bar", Effect: TaintEffectNoSchedule, }, taintToMatch: Taint{ Key: "foo", Value: "different-value", Effect: TaintEffectNoSchedule, }, expectMatch: true, }, { description: "two taints with the different key cannot match", taint: &Taint{ Key: "foo", Value: "bar", Effect: TaintEffectNoSchedule, }, taintToMatch: Taint{ Key: "different-key", Value: "bar", Effect: TaintEffectNoSchedule, }, expectMatch: false, }, { description: "two taints with the different effect cannot match", taint: &Taint{ Key: "foo", Value: "bar", Effect: TaintEffectNoSchedule, }, taintToMatch: Taint{ Key: "foo", Value: "bar", Effect: TaintEffectPreferNoSchedule, }, expectMatch: false, }, } for _, tc := range testCases { if tc.expectMatch != tc.taint.MatchTaint(tc.taintToMatch) { t.Errorf("[%s] expect taint %s match taint %s", tc.description, tc.taint.ToString(), tc.taintToMatch.ToString()) } } } func TestGetAvoidPodsFromNode(t *testing.T) { controllerFlag := true testCases := []struct { node *Node expectValue AvoidPods expectErr bool }{ { node: &Node{}, expectValue: AvoidPods{}, expectErr: false, }, { node: &Node{ ObjectMeta: metav1.ObjectMeta{ Annotations: map[string]string{ PreferAvoidPodsAnnotationKey: ` { "preferAvoidPods": [ { "podSignature": { "podController": { "apiVersion": "v1", "kind": "ReplicationController", "name": "foo", "uid": "abcdef123456", "controller": true } }, "reason": "some reason", "message": "some message" } ] }`, }, }, }, expectValue: AvoidPods{ PreferAvoidPods: []PreferAvoidPodsEntry{ { PodSignature: PodSignature{ PodController: &metav1.OwnerReference{ APIVersion: "v1", Kind: "ReplicationController", Name: "foo", UID: "abcdef123456", Controller: &controllerFlag, }, }, Reason: "some reason", Message: "some message", }, }, }, expectErr: false, }, { node: &Node{ // Missing end symbol of "podController" and "podSignature" ObjectMeta: metav1.ObjectMeta{ Annotations: map[string]string{ PreferAvoidPodsAnnotationKey: ` { "preferAvoidPods": [ { "podSignature": { "podController": { "kind": "ReplicationController", "apiVersion": "v1" "reason": "some reason", "message": "some message" } ] }`, }, }, }, expectValue: AvoidPods{}, expectErr: true, }, } for i, tc := range testCases { v, err := GetAvoidPodsFromNodeAnnotations(tc.node.Annotations) if err == nil && tc.expectErr { t.Errorf("[%v]expected error but got none.", i) } if err != nil && !tc.expectErr { t.Errorf("[%v]did not expect error but got: %v", i, err) } if !reflect.DeepEqual(tc.expectValue, v) { t.Errorf("[%v]expect value %v but got %v with %v", i, tc.expectValue, v, v.PreferAvoidPods[0].PodSignature.PodController.Controller) } } } func TestSysctlsFromPodAnnotation(t *testing.T) { type Test struct { annotation string expectValue []Sysctl expectErr bool } for i, test := range []Test{ { annotation: "", expectValue: nil, }, { annotation: "foo.bar", expectErr: true, }, { annotation: "=123", expectErr: true, }, { annotation: "foo.bar=", expectValue: []Sysctl{{Name: "foo.bar", Value: ""}}, }, { annotation: "foo.bar=42", expectValue: []Sysctl{{Name: "foo.bar", Value: "42"}}, }, { annotation: "foo.bar=42,", expectErr: true, }, { annotation: "foo.bar=42,abc.def=1", expectValue: []Sysctl{{Name: "foo.bar", Value: "42"}, {Name: "abc.def", Value: "1"}}, }, } { sysctls, err := SysctlsFromPodAnnotation(test.annotation) if test.expectErr && err == nil { t.Errorf("[%v]expected error but got none", i) } else if !test.expectErr && err != nil { t.Errorf("[%v]did not expect error but got: %v", i, err) } else if !reflect.DeepEqual(sysctls, test.expectValue) { t.Errorf("[%v]expect value %v but got %v", i, test.expectValue, sysctls) } } }