cri-o/server/utils_test.go
Antonio Murdaca 902acca4af
container_create: correctly set image and kube envs
Signed-off-by: Antonio Murdaca <runcom@redhat.com>
2017-11-30 12:28:50 +01:00

143 lines
3.1 KiB
Go

package server
import (
"io/ioutil"
"os"
"testing"
"github.com/opencontainers/image-spec/specs-go/v1"
pb "k8s.io/kubernetes/pkg/kubelet/apis/cri/v1alpha1/runtime"
)
const (
defaultDNSPath = "/etc/resolv.conf"
testDNSPath = "fixtures/resolv_test.conf"
dnsPath = "fixtures/resolv.conf"
)
func TestParseDNSOptions(t *testing.T) {
testCases := []struct {
Servers, Searches, Options []string
Path string
Want string
}{
{
[]string{},
[]string{},
[]string{},
testDNSPath, defaultDNSPath,
},
{
[]string{"cri-o.io", "github.com"},
[]string{"192.30.253.113", "192.30.252.153"},
[]string{"timeout:5", "attempts:3"},
testDNSPath, dnsPath,
},
}
for _, c := range testCases {
if err := parseDNSOptions(c.Servers, c.Searches,
c.Options, c.Path); err != nil {
t.Error(err)
}
expect, _ := ioutil.ReadFile(c.Want)
result, _ := ioutil.ReadFile(c.Path)
if string(expect) != string(result) {
t.Errorf("expect %v: \n but got : %v", string(expect), string(result))
}
os.Remove(c.Path)
}
}
func TestSysctlsFromPodAnnotations(t *testing.T) {
testCases := []struct {
Annotations map[string]string
SafeSysctls []Sysctl
UnsafeSysctls []Sysctl
}{
{
map[string]string{
"foo-": "bar",
SysctlsPodAnnotationKey: "kernel.shmmax=100000000,safe=20000000",
},
[]Sysctl{
{"kernel.shmmax", "100000000"},
{"safe", "20000000"},
},
[]Sysctl{},
},
{
map[string]string{
UnsafeSysctlsPodAnnotationKey: "kernel.shmmax=10,unsafe=20",
},
[]Sysctl{},
[]Sysctl{
{"kernel.shmmax", "10"},
{"unsafe", "20"},
},
},
{
map[string]string{
"bar..": "42",
SysctlsPodAnnotationKey: "kernel.shmmax=20000000,safe=40000000",
UnsafeSysctlsPodAnnotationKey: "kernel.shmmax=10,unsafe=20",
},
[]Sysctl{
{"kernel.shmmax", "20000000"},
{"safe", "40000000"},
},
[]Sysctl{
{"kernel.shmmax", "10"},
{"unsafe", "20"},
},
},
}
for _, c := range testCases {
safe, unsafe, err := SysctlsFromPodAnnotations(c.Annotations)
if err != nil {
t.Error(err)
}
for index, sysctl := range safe {
if sysctl.Name != safe[index].Name || sysctl.Value != safe[index].Value {
t.Errorf("Expect safe: %v, but got: %v\n", safe[index], sysctl)
}
}
for index, sysctl := range unsafe {
if sysctl.Name != unsafe[index].Name || sysctl.Value != unsafe[index].Value {
t.Errorf("Expect unsafe: %v, but got: %v\n", safe[index], sysctl)
}
}
}
}
func TestMergeEnvs(t *testing.T) {
configImage := &v1.Image{
Config: v1.ImageConfig{
Env: []string{"VAR1=1", "VAR2=2"},
},
}
configKube := []*pb.KeyValue{
{
Key: "VAR2",
Value: "3",
},
{
Key: "VAR3",
Value: "3",
},
}
mergedEnvs := mergeEnvs(configImage, configKube)
if len(mergedEnvs) != 3 {
t.Fatalf("Expected 3 env var, VAR1=1, VAR2=3 and VAR3=3, found %d", len(mergedEnvs))
}
for _, env := range mergedEnvs {
if env != "VAR1=1" && env != "VAR2=3" && env != "VAR3=3" {
t.Fatalf("Expected VAR1=1 or VAR2=3 or VAR3=3, found %s", env)
}
}
}