52baf68d50
Signed-off-by: Michał Żyłowski <michal.zylowski@intel.com>
480 lines
12 KiB
Go
480 lines
12 KiB
Go
/*
|
|
Copyright 2015 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package v1
|
|
|
|
import (
|
|
"reflect"
|
|
"testing"
|
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/labels"
|
|
"k8s.io/kubernetes/pkg/api"
|
|
)
|
|
|
|
func TestAddToNodeAddresses(t *testing.T) {
|
|
testCases := []struct {
|
|
existing []NodeAddress
|
|
toAdd []NodeAddress
|
|
expected []NodeAddress
|
|
}{
|
|
{
|
|
existing: []NodeAddress{},
|
|
toAdd: []NodeAddress{},
|
|
expected: []NodeAddress{},
|
|
},
|
|
{
|
|
existing: []NodeAddress{},
|
|
toAdd: []NodeAddress{
|
|
{Type: NodeExternalIP, Address: "1.1.1.1"},
|
|
{Type: NodeHostName, Address: "localhost"},
|
|
},
|
|
expected: []NodeAddress{
|
|
{Type: NodeExternalIP, Address: "1.1.1.1"},
|
|
{Type: NodeHostName, Address: "localhost"},
|
|
},
|
|
},
|
|
{
|
|
existing: []NodeAddress{},
|
|
toAdd: []NodeAddress{
|
|
{Type: NodeExternalIP, Address: "1.1.1.1"},
|
|
{Type: NodeExternalIP, Address: "1.1.1.1"},
|
|
},
|
|
expected: []NodeAddress{
|
|
{Type: NodeExternalIP, Address: "1.1.1.1"},
|
|
},
|
|
},
|
|
{
|
|
existing: []NodeAddress{
|
|
{Type: NodeExternalIP, Address: "1.1.1.1"},
|
|
{Type: NodeInternalIP, Address: "10.1.1.1"},
|
|
},
|
|
toAdd: []NodeAddress{
|
|
{Type: NodeExternalIP, Address: "1.1.1.1"},
|
|
{Type: NodeHostName, Address: "localhost"},
|
|
},
|
|
expected: []NodeAddress{
|
|
{Type: NodeExternalIP, Address: "1.1.1.1"},
|
|
{Type: NodeInternalIP, Address: "10.1.1.1"},
|
|
{Type: NodeHostName, Address: "localhost"},
|
|
},
|
|
},
|
|
}
|
|
|
|
for i, tc := range testCases {
|
|
AddToNodeAddresses(&tc.existing, tc.toAdd...)
|
|
if !api.Semantic.DeepEqual(tc.expected, tc.existing) {
|
|
t.Errorf("case[%d], expected: %v, got: %v", i, tc.expected, tc.existing)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestGetAccessModesFromString(t *testing.T) {
|
|
modes := GetAccessModesFromString("ROX")
|
|
if !containsAccessMode(modes, ReadOnlyMany) {
|
|
t.Errorf("Expected mode %s, but got %+v", ReadOnlyMany, modes)
|
|
}
|
|
|
|
modes = GetAccessModesFromString("ROX,RWX")
|
|
if !containsAccessMode(modes, ReadOnlyMany) {
|
|
t.Errorf("Expected mode %s, but got %+v", ReadOnlyMany, modes)
|
|
}
|
|
if !containsAccessMode(modes, ReadWriteMany) {
|
|
t.Errorf("Expected mode %s, but got %+v", ReadWriteMany, modes)
|
|
}
|
|
|
|
modes = GetAccessModesFromString("RWO,ROX,RWX")
|
|
if !containsAccessMode(modes, ReadOnlyMany) {
|
|
t.Errorf("Expected mode %s, but got %+v", ReadOnlyMany, modes)
|
|
}
|
|
if !containsAccessMode(modes, ReadWriteMany) {
|
|
t.Errorf("Expected mode %s, but got %+v", ReadWriteMany, modes)
|
|
}
|
|
}
|
|
|
|
func TestRemoveDuplicateAccessModes(t *testing.T) {
|
|
modes := []PersistentVolumeAccessMode{
|
|
ReadWriteOnce, ReadOnlyMany, ReadOnlyMany, ReadOnlyMany,
|
|
}
|
|
modes = removeDuplicateAccessModes(modes)
|
|
if len(modes) != 2 {
|
|
t.Errorf("Expected 2 distinct modes in set but found %v", len(modes))
|
|
}
|
|
}
|
|
|
|
func TestNodeSelectorRequirementsAsSelector(t *testing.T) {
|
|
matchExpressions := []NodeSelectorRequirement{{
|
|
Key: "foo",
|
|
Operator: NodeSelectorOpIn,
|
|
Values: []string{"bar", "baz"},
|
|
}}
|
|
mustParse := func(s string) labels.Selector {
|
|
out, e := labels.Parse(s)
|
|
if e != nil {
|
|
panic(e)
|
|
}
|
|
return out
|
|
}
|
|
tc := []struct {
|
|
in []NodeSelectorRequirement
|
|
out labels.Selector
|
|
expectErr bool
|
|
}{
|
|
{in: nil, out: labels.Nothing()},
|
|
{in: []NodeSelectorRequirement{}, out: labels.Nothing()},
|
|
{
|
|
in: matchExpressions,
|
|
out: mustParse("foo in (baz,bar)"),
|
|
},
|
|
{
|
|
in: []NodeSelectorRequirement{{
|
|
Key: "foo",
|
|
Operator: NodeSelectorOpExists,
|
|
Values: []string{"bar", "baz"},
|
|
}},
|
|
expectErr: true,
|
|
},
|
|
{
|
|
in: []NodeSelectorRequirement{{
|
|
Key: "foo",
|
|
Operator: NodeSelectorOpGt,
|
|
Values: []string{"1"},
|
|
}},
|
|
out: mustParse("foo>1"),
|
|
},
|
|
{
|
|
in: []NodeSelectorRequirement{{
|
|
Key: "bar",
|
|
Operator: NodeSelectorOpLt,
|
|
Values: []string{"7"},
|
|
}},
|
|
out: mustParse("bar<7"),
|
|
},
|
|
}
|
|
|
|
for i, tc := range tc {
|
|
out, err := NodeSelectorRequirementsAsSelector(tc.in)
|
|
if err == nil && tc.expectErr {
|
|
t.Errorf("[%v]expected error but got none.", i)
|
|
}
|
|
if err != nil && !tc.expectErr {
|
|
t.Errorf("[%v]did not expect error but got: %v", i, err)
|
|
}
|
|
if !reflect.DeepEqual(out, tc.out) {
|
|
t.Errorf("[%v]expected:\n\t%+v\nbut got:\n\t%+v", i, tc.out, out)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestGetAffinityFromPod(t *testing.T) {
|
|
testCases := []struct {
|
|
pod *Pod
|
|
expectErr bool
|
|
}{
|
|
{
|
|
pod: &Pod{},
|
|
expectErr: false,
|
|
},
|
|
{
|
|
pod: &Pod{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Annotations: map[string]string{
|
|
AffinityAnnotationKey: `
|
|
{"nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": {
|
|
"nodeSelectorTerms": [{
|
|
"matchExpressions": [{
|
|
"key": "foo",
|
|
"operator": "In",
|
|
"values": ["value1", "value2"]
|
|
}]
|
|
}]
|
|
}}}`,
|
|
},
|
|
},
|
|
},
|
|
expectErr: false,
|
|
},
|
|
{
|
|
pod: &Pod{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Annotations: map[string]string{
|
|
AffinityAnnotationKey: `
|
|
{"nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": {
|
|
"nodeSelectorTerms": [{
|
|
"matchExpressions": [{
|
|
"key": "foo",
|
|
`,
|
|
},
|
|
},
|
|
},
|
|
expectErr: true,
|
|
},
|
|
}
|
|
|
|
for i, tc := range testCases {
|
|
_, err := GetAffinityFromPodAnnotations(tc.pod.Annotations)
|
|
if err == nil && tc.expectErr {
|
|
t.Errorf("[%v]expected error but got none.", i)
|
|
}
|
|
if err != nil && !tc.expectErr {
|
|
t.Errorf("[%v]did not expect error but got: %v", i, err)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestTaintToString(t *testing.T) {
|
|
testCases := []struct {
|
|
taint *Taint
|
|
expectedString string
|
|
}{
|
|
{
|
|
taint: &Taint{
|
|
Key: "foo",
|
|
Value: "bar",
|
|
Effect: TaintEffectNoSchedule,
|
|
},
|
|
expectedString: "foo=bar:NoSchedule",
|
|
},
|
|
{
|
|
taint: &Taint{
|
|
Key: "foo",
|
|
Effect: TaintEffectNoSchedule,
|
|
},
|
|
expectedString: "foo:NoSchedule",
|
|
},
|
|
}
|
|
|
|
for i, tc := range testCases {
|
|
if tc.expectedString != tc.taint.ToString() {
|
|
t.Errorf("[%v] expected taint %v converted to %s, got %s", i, tc.taint, tc.expectedString, tc.taint.ToString())
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestMatchTaint(t *testing.T) {
|
|
testCases := []struct {
|
|
description string
|
|
taint *Taint
|
|
taintToMatch Taint
|
|
expectMatch bool
|
|
}{
|
|
{
|
|
description: "two taints with the same key,value,effect should match",
|
|
taint: &Taint{
|
|
Key: "foo",
|
|
Value: "bar",
|
|
Effect: TaintEffectNoSchedule,
|
|
},
|
|
taintToMatch: Taint{
|
|
Key: "foo",
|
|
Value: "bar",
|
|
Effect: TaintEffectNoSchedule,
|
|
},
|
|
expectMatch: true,
|
|
},
|
|
{
|
|
description: "two taints with the same key,effect but different value should match",
|
|
taint: &Taint{
|
|
Key: "foo",
|
|
Value: "bar",
|
|
Effect: TaintEffectNoSchedule,
|
|
},
|
|
taintToMatch: Taint{
|
|
Key: "foo",
|
|
Value: "different-value",
|
|
Effect: TaintEffectNoSchedule,
|
|
},
|
|
expectMatch: true,
|
|
},
|
|
{
|
|
description: "two taints with the different key cannot match",
|
|
taint: &Taint{
|
|
Key: "foo",
|
|
Value: "bar",
|
|
Effect: TaintEffectNoSchedule,
|
|
},
|
|
taintToMatch: Taint{
|
|
Key: "different-key",
|
|
Value: "bar",
|
|
Effect: TaintEffectNoSchedule,
|
|
},
|
|
expectMatch: false,
|
|
},
|
|
{
|
|
description: "two taints with the different effect cannot match",
|
|
taint: &Taint{
|
|
Key: "foo",
|
|
Value: "bar",
|
|
Effect: TaintEffectNoSchedule,
|
|
},
|
|
taintToMatch: Taint{
|
|
Key: "foo",
|
|
Value: "bar",
|
|
Effect: TaintEffectPreferNoSchedule,
|
|
},
|
|
expectMatch: false,
|
|
},
|
|
}
|
|
|
|
for _, tc := range testCases {
|
|
if tc.expectMatch != tc.taint.MatchTaint(tc.taintToMatch) {
|
|
t.Errorf("[%s] expect taint %s match taint %s", tc.description, tc.taint.ToString(), tc.taintToMatch.ToString())
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestGetAvoidPodsFromNode(t *testing.T) {
|
|
controllerFlag := true
|
|
testCases := []struct {
|
|
node *Node
|
|
expectValue AvoidPods
|
|
expectErr bool
|
|
}{
|
|
{
|
|
node: &Node{},
|
|
expectValue: AvoidPods{},
|
|
expectErr: false,
|
|
},
|
|
{
|
|
node: &Node{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Annotations: map[string]string{
|
|
PreferAvoidPodsAnnotationKey: `
|
|
{
|
|
"preferAvoidPods": [
|
|
{
|
|
"podSignature": {
|
|
"podController": {
|
|
"apiVersion": "v1",
|
|
"kind": "ReplicationController",
|
|
"name": "foo",
|
|
"uid": "abcdef123456",
|
|
"controller": true
|
|
}
|
|
},
|
|
"reason": "some reason",
|
|
"message": "some message"
|
|
}
|
|
]
|
|
}`,
|
|
},
|
|
},
|
|
},
|
|
expectValue: AvoidPods{
|
|
PreferAvoidPods: []PreferAvoidPodsEntry{
|
|
{
|
|
PodSignature: PodSignature{
|
|
PodController: &metav1.OwnerReference{
|
|
APIVersion: "v1",
|
|
Kind: "ReplicationController",
|
|
Name: "foo",
|
|
UID: "abcdef123456",
|
|
Controller: &controllerFlag,
|
|
},
|
|
},
|
|
Reason: "some reason",
|
|
Message: "some message",
|
|
},
|
|
},
|
|
},
|
|
expectErr: false,
|
|
},
|
|
{
|
|
node: &Node{
|
|
// Missing end symbol of "podController" and "podSignature"
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Annotations: map[string]string{
|
|
PreferAvoidPodsAnnotationKey: `
|
|
{
|
|
"preferAvoidPods": [
|
|
{
|
|
"podSignature": {
|
|
"podController": {
|
|
"kind": "ReplicationController",
|
|
"apiVersion": "v1"
|
|
"reason": "some reason",
|
|
"message": "some message"
|
|
}
|
|
]
|
|
}`,
|
|
},
|
|
},
|
|
},
|
|
expectValue: AvoidPods{},
|
|
expectErr: true,
|
|
},
|
|
}
|
|
|
|
for i, tc := range testCases {
|
|
v, err := GetAvoidPodsFromNodeAnnotations(tc.node.Annotations)
|
|
if err == nil && tc.expectErr {
|
|
t.Errorf("[%v]expected error but got none.", i)
|
|
}
|
|
if err != nil && !tc.expectErr {
|
|
t.Errorf("[%v]did not expect error but got: %v", i, err)
|
|
}
|
|
if !reflect.DeepEqual(tc.expectValue, v) {
|
|
t.Errorf("[%v]expect value %v but got %v with %v", i, tc.expectValue, v, v.PreferAvoidPods[0].PodSignature.PodController.Controller)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestSysctlsFromPodAnnotation(t *testing.T) {
|
|
type Test struct {
|
|
annotation string
|
|
expectValue []Sysctl
|
|
expectErr bool
|
|
}
|
|
for i, test := range []Test{
|
|
{
|
|
annotation: "",
|
|
expectValue: nil,
|
|
},
|
|
{
|
|
annotation: "foo.bar",
|
|
expectErr: true,
|
|
},
|
|
{
|
|
annotation: "=123",
|
|
expectErr: true,
|
|
},
|
|
{
|
|
annotation: "foo.bar=",
|
|
expectValue: []Sysctl{{Name: "foo.bar", Value: ""}},
|
|
},
|
|
{
|
|
annotation: "foo.bar=42",
|
|
expectValue: []Sysctl{{Name: "foo.bar", Value: "42"}},
|
|
},
|
|
{
|
|
annotation: "foo.bar=42,",
|
|
expectErr: true,
|
|
},
|
|
{
|
|
annotation: "foo.bar=42,abc.def=1",
|
|
expectValue: []Sysctl{{Name: "foo.bar", Value: "42"}, {Name: "abc.def", Value: "1"}},
|
|
},
|
|
} {
|
|
sysctls, err := SysctlsFromPodAnnotation(test.annotation)
|
|
if test.expectErr && err == nil {
|
|
t.Errorf("[%v]expected error but got none", i)
|
|
} else if !test.expectErr && err != nil {
|
|
t.Errorf("[%v]did not expect error but got: %v", i, err)
|
|
} else if !reflect.DeepEqual(sysctls, test.expectValue) {
|
|
t.Errorf("[%v]expect value %v but got %v", i, test.expectValue, sysctls)
|
|
}
|
|
}
|
|
}
|