2016-11-18 21:34:25 +00:00
|
|
|
/*
|
|
|
|
Copyright 2015 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package v1
|
|
|
|
|
|
|
|
import (
|
|
|
|
"reflect"
|
|
|
|
"testing"
|
|
|
|
|
2017-01-25 13:39:54 +00:00
|
|
|
apiequality "k8s.io/apimachinery/pkg/api/equality"
|
2017-01-11 14:09:48 +00:00
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
|
|
"k8s.io/apimachinery/pkg/labels"
|
2016-11-18 21:34:25 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestAddToNodeAddresses(t *testing.T) {
|
|
|
|
testCases := []struct {
|
|
|
|
existing []NodeAddress
|
|
|
|
toAdd []NodeAddress
|
|
|
|
expected []NodeAddress
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
existing: []NodeAddress{},
|
|
|
|
toAdd: []NodeAddress{},
|
|
|
|
expected: []NodeAddress{},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
existing: []NodeAddress{},
|
|
|
|
toAdd: []NodeAddress{
|
|
|
|
{Type: NodeExternalIP, Address: "1.1.1.1"},
|
|
|
|
{Type: NodeHostName, Address: "localhost"},
|
|
|
|
},
|
|
|
|
expected: []NodeAddress{
|
|
|
|
{Type: NodeExternalIP, Address: "1.1.1.1"},
|
|
|
|
{Type: NodeHostName, Address: "localhost"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
existing: []NodeAddress{},
|
|
|
|
toAdd: []NodeAddress{
|
|
|
|
{Type: NodeExternalIP, Address: "1.1.1.1"},
|
|
|
|
{Type: NodeExternalIP, Address: "1.1.1.1"},
|
|
|
|
},
|
|
|
|
expected: []NodeAddress{
|
|
|
|
{Type: NodeExternalIP, Address: "1.1.1.1"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
existing: []NodeAddress{
|
|
|
|
{Type: NodeExternalIP, Address: "1.1.1.1"},
|
|
|
|
{Type: NodeInternalIP, Address: "10.1.1.1"},
|
|
|
|
},
|
|
|
|
toAdd: []NodeAddress{
|
|
|
|
{Type: NodeExternalIP, Address: "1.1.1.1"},
|
|
|
|
{Type: NodeHostName, Address: "localhost"},
|
|
|
|
},
|
|
|
|
expected: []NodeAddress{
|
|
|
|
{Type: NodeExternalIP, Address: "1.1.1.1"},
|
|
|
|
{Type: NodeInternalIP, Address: "10.1.1.1"},
|
|
|
|
{Type: NodeHostName, Address: "localhost"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, tc := range testCases {
|
|
|
|
AddToNodeAddresses(&tc.existing, tc.toAdd...)
|
2017-01-25 13:39:54 +00:00
|
|
|
if !apiequality.Semantic.DeepEqual(tc.expected, tc.existing) {
|
2016-11-18 21:34:25 +00:00
|
|
|
t.Errorf("case[%d], expected: %v, got: %v", i, tc.expected, tc.existing)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestGetAccessModesFromString(t *testing.T) {
|
|
|
|
modes := GetAccessModesFromString("ROX")
|
|
|
|
if !containsAccessMode(modes, ReadOnlyMany) {
|
|
|
|
t.Errorf("Expected mode %s, but got %+v", ReadOnlyMany, modes)
|
|
|
|
}
|
|
|
|
|
|
|
|
modes = GetAccessModesFromString("ROX,RWX")
|
|
|
|
if !containsAccessMode(modes, ReadOnlyMany) {
|
|
|
|
t.Errorf("Expected mode %s, but got %+v", ReadOnlyMany, modes)
|
|
|
|
}
|
|
|
|
if !containsAccessMode(modes, ReadWriteMany) {
|
|
|
|
t.Errorf("Expected mode %s, but got %+v", ReadWriteMany, modes)
|
|
|
|
}
|
|
|
|
|
|
|
|
modes = GetAccessModesFromString("RWO,ROX,RWX")
|
|
|
|
if !containsAccessMode(modes, ReadOnlyMany) {
|
|
|
|
t.Errorf("Expected mode %s, but got %+v", ReadOnlyMany, modes)
|
|
|
|
}
|
|
|
|
if !containsAccessMode(modes, ReadWriteMany) {
|
|
|
|
t.Errorf("Expected mode %s, but got %+v", ReadWriteMany, modes)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestRemoveDuplicateAccessModes(t *testing.T) {
|
|
|
|
modes := []PersistentVolumeAccessMode{
|
|
|
|
ReadWriteOnce, ReadOnlyMany, ReadOnlyMany, ReadOnlyMany,
|
|
|
|
}
|
|
|
|
modes = removeDuplicateAccessModes(modes)
|
|
|
|
if len(modes) != 2 {
|
|
|
|
t.Errorf("Expected 2 distinct modes in set but found %v", len(modes))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestNodeSelectorRequirementsAsSelector(t *testing.T) {
|
|
|
|
matchExpressions := []NodeSelectorRequirement{{
|
|
|
|
Key: "foo",
|
|
|
|
Operator: NodeSelectorOpIn,
|
|
|
|
Values: []string{"bar", "baz"},
|
|
|
|
}}
|
|
|
|
mustParse := func(s string) labels.Selector {
|
|
|
|
out, e := labels.Parse(s)
|
|
|
|
if e != nil {
|
|
|
|
panic(e)
|
|
|
|
}
|
|
|
|
return out
|
|
|
|
}
|
|
|
|
tc := []struct {
|
|
|
|
in []NodeSelectorRequirement
|
|
|
|
out labels.Selector
|
|
|
|
expectErr bool
|
|
|
|
}{
|
|
|
|
{in: nil, out: labels.Nothing()},
|
|
|
|
{in: []NodeSelectorRequirement{}, out: labels.Nothing()},
|
|
|
|
{
|
|
|
|
in: matchExpressions,
|
|
|
|
out: mustParse("foo in (baz,bar)"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
in: []NodeSelectorRequirement{{
|
|
|
|
Key: "foo",
|
|
|
|
Operator: NodeSelectorOpExists,
|
|
|
|
Values: []string{"bar", "baz"},
|
|
|
|
}},
|
|
|
|
expectErr: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
in: []NodeSelectorRequirement{{
|
|
|
|
Key: "foo",
|
|
|
|
Operator: NodeSelectorOpGt,
|
|
|
|
Values: []string{"1"},
|
|
|
|
}},
|
|
|
|
out: mustParse("foo>1"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
in: []NodeSelectorRequirement{{
|
|
|
|
Key: "bar",
|
|
|
|
Operator: NodeSelectorOpLt,
|
|
|
|
Values: []string{"7"},
|
|
|
|
}},
|
|
|
|
out: mustParse("bar<7"),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, tc := range tc {
|
|
|
|
out, err := NodeSelectorRequirementsAsSelector(tc.in)
|
|
|
|
if err == nil && tc.expectErr {
|
|
|
|
t.Errorf("[%v]expected error but got none.", i)
|
|
|
|
}
|
|
|
|
if err != nil && !tc.expectErr {
|
|
|
|
t.Errorf("[%v]did not expect error but got: %v", i, err)
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(out, tc.out) {
|
|
|
|
t.Errorf("[%v]expected:\n\t%+v\nbut got:\n\t%+v", i, tc.out, out)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestTaintToString(t *testing.T) {
|
|
|
|
testCases := []struct {
|
|
|
|
taint *Taint
|
|
|
|
expectedString string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
taint: &Taint{
|
|
|
|
Key: "foo",
|
|
|
|
Value: "bar",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
expectedString: "foo=bar:NoSchedule",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
taint: &Taint{
|
|
|
|
Key: "foo",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
expectedString: "foo:NoSchedule",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, tc := range testCases {
|
|
|
|
if tc.expectedString != tc.taint.ToString() {
|
|
|
|
t.Errorf("[%v] expected taint %v converted to %s, got %s", i, tc.taint, tc.expectedString, tc.taint.ToString())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestMatchTaint(t *testing.T) {
|
|
|
|
testCases := []struct {
|
|
|
|
description string
|
|
|
|
taint *Taint
|
|
|
|
taintToMatch Taint
|
|
|
|
expectMatch bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
description: "two taints with the same key,value,effect should match",
|
|
|
|
taint: &Taint{
|
|
|
|
Key: "foo",
|
|
|
|
Value: "bar",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
taintToMatch: Taint{
|
|
|
|
Key: "foo",
|
|
|
|
Value: "bar",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
expectMatch: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
description: "two taints with the same key,effect but different value should match",
|
|
|
|
taint: &Taint{
|
|
|
|
Key: "foo",
|
|
|
|
Value: "bar",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
taintToMatch: Taint{
|
|
|
|
Key: "foo",
|
|
|
|
Value: "different-value",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
expectMatch: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
description: "two taints with the different key cannot match",
|
|
|
|
taint: &Taint{
|
|
|
|
Key: "foo",
|
|
|
|
Value: "bar",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
taintToMatch: Taint{
|
|
|
|
Key: "different-key",
|
|
|
|
Value: "bar",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
expectMatch: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
description: "two taints with the different effect cannot match",
|
|
|
|
taint: &Taint{
|
|
|
|
Key: "foo",
|
|
|
|
Value: "bar",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
taintToMatch: Taint{
|
|
|
|
Key: "foo",
|
|
|
|
Value: "bar",
|
|
|
|
Effect: TaintEffectPreferNoSchedule,
|
|
|
|
},
|
|
|
|
expectMatch: false,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, tc := range testCases {
|
2017-02-06 12:59:50 +00:00
|
|
|
if tc.expectMatch != tc.taint.MatchTaint(&tc.taintToMatch) {
|
2016-11-18 21:34:25 +00:00
|
|
|
t.Errorf("[%s] expect taint %s match taint %s", tc.description, tc.taint.ToString(), tc.taintToMatch.ToString())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-01-14 08:18:14 +00:00
|
|
|
func TestTolerationToleratesTaint(t *testing.T) {
|
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
description string
|
|
|
|
toleration Toleration
|
|
|
|
taint Taint
|
|
|
|
expectTolerated bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
description: "toleration and taint have the same key and effect, and operator is Exists, and taint has no value, expect tolerated",
|
|
|
|
toleration: Toleration{
|
|
|
|
Key: "foo",
|
|
|
|
Operator: TolerationOpExists,
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
taint: Taint{
|
|
|
|
Key: "foo",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
expectTolerated: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
description: "toleration and taint have the same key and effect, and operator is Exists, and taint has some value, expect tolerated",
|
|
|
|
toleration: Toleration{
|
|
|
|
Key: "foo",
|
|
|
|
Operator: TolerationOpExists,
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
taint: Taint{
|
|
|
|
Key: "foo",
|
|
|
|
Value: "bar",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
expectTolerated: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
description: "toleration and taint have the same effect, toleration has empty key and operator is Exists, means match all taints, expect tolerated",
|
|
|
|
toleration: Toleration{
|
|
|
|
Key: "",
|
|
|
|
Operator: TolerationOpExists,
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
taint: Taint{
|
|
|
|
Key: "foo",
|
|
|
|
Value: "bar",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
expectTolerated: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
description: "toleration and taint have the same key, effect and value, and operator is Equal, expect tolerated",
|
|
|
|
toleration: Toleration{
|
|
|
|
Key: "foo",
|
|
|
|
Operator: TolerationOpEqual,
|
|
|
|
Value: "bar",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
taint: Taint{
|
|
|
|
Key: "foo",
|
|
|
|
Value: "bar",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
expectTolerated: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
description: "toleration and taint have the same key and effect, but different values, and operator is Equal, expect not tolerated",
|
|
|
|
toleration: Toleration{
|
|
|
|
Key: "foo",
|
|
|
|
Operator: TolerationOpEqual,
|
|
|
|
Value: "value1",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
taint: Taint{
|
|
|
|
Key: "foo",
|
|
|
|
Value: "value2",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
expectTolerated: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
description: "toleration and taint have the same key and value, but different effects, and operator is Equal, expect not tolerated",
|
|
|
|
toleration: Toleration{
|
|
|
|
Key: "foo",
|
|
|
|
Operator: TolerationOpEqual,
|
|
|
|
Value: "bar",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
taint: Taint{
|
|
|
|
Key: "foo",
|
|
|
|
Value: "bar",
|
|
|
|
Effect: TaintEffectNoExecute,
|
|
|
|
},
|
|
|
|
expectTolerated: false,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tc := range testCases {
|
|
|
|
if tolerated := tc.toleration.ToleratesTaint(&tc.taint); tc.expectTolerated != tolerated {
|
|
|
|
t.Errorf("[%s] expect %v, got %v: toleration %+v, taint %s", tc.description, tc.expectTolerated, tolerated, tc.toleration, tc.taint.ToString())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestTolerationsTolerateTaintsWithFilter(t *testing.T) {
|
|
|
|
testCases := []struct {
|
2017-01-23 17:33:33 +00:00
|
|
|
description string
|
|
|
|
tolerations []Toleration
|
|
|
|
taints []Taint
|
|
|
|
applyFilter taintsFilterFunc
|
|
|
|
expectTolerated bool
|
2017-01-14 08:18:14 +00:00
|
|
|
}{
|
|
|
|
{
|
2017-01-23 17:33:33 +00:00
|
|
|
description: "empty tolerations tolerate empty taints",
|
|
|
|
tolerations: []Toleration{},
|
|
|
|
taints: []Taint{},
|
|
|
|
applyFilter: func(t *Taint) bool { return true },
|
|
|
|
expectTolerated: true,
|
2017-01-14 08:18:14 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
description: "non-empty tolerations tolerate empty taints",
|
|
|
|
tolerations: []Toleration{
|
|
|
|
{
|
|
|
|
Key: "foo",
|
|
|
|
Operator: "Exists",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
},
|
2017-01-23 17:33:33 +00:00
|
|
|
taints: []Taint{},
|
|
|
|
applyFilter: func(t *Taint) bool { return true },
|
|
|
|
expectTolerated: true,
|
2017-01-14 08:18:14 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
description: "tolerations match all taints, expect tolerated",
|
|
|
|
tolerations: []Toleration{
|
|
|
|
{
|
|
|
|
Key: "foo",
|
|
|
|
Operator: "Exists",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
taints: []Taint{
|
|
|
|
{
|
|
|
|
Key: "foo",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
},
|
2017-01-23 17:33:33 +00:00
|
|
|
applyFilter: func(t *Taint) bool { return true },
|
|
|
|
expectTolerated: true,
|
2017-01-14 08:18:14 +00:00
|
|
|
},
|
|
|
|
{
|
2017-01-23 17:33:33 +00:00
|
|
|
description: "tolerations don't match taints, but no taints apply to the filter, expect tolerated",
|
2017-01-14 08:18:14 +00:00
|
|
|
tolerations: []Toleration{
|
|
|
|
{
|
|
|
|
Key: "foo",
|
|
|
|
Operator: "Exists",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
taints: []Taint{
|
|
|
|
{
|
|
|
|
Key: "bar",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
},
|
2017-01-23 17:33:33 +00:00
|
|
|
applyFilter: func(t *Taint) bool { return false },
|
|
|
|
expectTolerated: true,
|
2017-01-14 08:18:14 +00:00
|
|
|
},
|
|
|
|
{
|
2017-01-23 17:33:33 +00:00
|
|
|
description: "no filterFunc indicated, means all taints apply to the filter, tolerations don't match taints, expect untolerated",
|
2017-01-14 08:18:14 +00:00
|
|
|
tolerations: []Toleration{
|
|
|
|
{
|
|
|
|
Key: "foo",
|
|
|
|
Operator: "Exists",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
taints: []Taint{
|
|
|
|
{
|
|
|
|
Key: "bar",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
},
|
2017-01-23 17:33:33 +00:00
|
|
|
applyFilter: nil,
|
|
|
|
expectTolerated: false,
|
2017-01-14 08:18:14 +00:00
|
|
|
},
|
|
|
|
{
|
2017-01-23 17:33:33 +00:00
|
|
|
description: "tolerations match taints, expect tolerated",
|
2017-01-14 08:18:14 +00:00
|
|
|
tolerations: []Toleration{
|
|
|
|
{
|
|
|
|
Key: "foo",
|
|
|
|
Operator: "Exists",
|
|
|
|
Effect: TaintEffectNoExecute,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
taints: []Taint{
|
|
|
|
{
|
|
|
|
Key: "foo",
|
|
|
|
Effect: TaintEffectNoExecute,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Key: "bar",
|
|
|
|
Effect: TaintEffectNoSchedule,
|
|
|
|
},
|
|
|
|
},
|
2017-01-23 17:33:33 +00:00
|
|
|
applyFilter: func(t *Taint) bool { return t.Effect == TaintEffectNoExecute },
|
|
|
|
expectTolerated: true,
|
2017-01-14 08:18:14 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, tc := range testCases {
|
2017-01-23 17:33:33 +00:00
|
|
|
if tc.expectTolerated != TolerationsTolerateTaintsWithFilter(tc.tolerations, tc.taints, tc.applyFilter) {
|
2017-01-14 08:18:14 +00:00
|
|
|
filteredTaints := []Taint{}
|
|
|
|
for _, taint := range tc.taints {
|
2017-01-23 17:33:33 +00:00
|
|
|
if tc.applyFilter != nil && !tc.applyFilter(&taint) {
|
2017-01-14 08:18:14 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
filteredTaints = append(filteredTaints, taint)
|
|
|
|
}
|
|
|
|
t.Errorf("[%s] expect tolerations %+v tolerate filtered taints %+v in taints %+v", tc.description, tc.tolerations, filteredTaints, tc.taints)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-11-18 21:34:25 +00:00
|
|
|
func TestGetAvoidPodsFromNode(t *testing.T) {
|
|
|
|
controllerFlag := true
|
|
|
|
testCases := []struct {
|
|
|
|
node *Node
|
|
|
|
expectValue AvoidPods
|
|
|
|
expectErr bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
node: &Node{},
|
|
|
|
expectValue: AvoidPods{},
|
|
|
|
expectErr: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
node: &Node{
|
2017-01-11 20:28:46 +00:00
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
2016-11-18 21:34:25 +00:00
|
|
|
Annotations: map[string]string{
|
|
|
|
PreferAvoidPodsAnnotationKey: `
|
|
|
|
{
|
|
|
|
"preferAvoidPods": [
|
|
|
|
{
|
|
|
|
"podSignature": {
|
|
|
|
"podController": {
|
|
|
|
"apiVersion": "v1",
|
|
|
|
"kind": "ReplicationController",
|
|
|
|
"name": "foo",
|
|
|
|
"uid": "abcdef123456",
|
|
|
|
"controller": true
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"reason": "some reason",
|
|
|
|
"message": "some message"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}`,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
expectValue: AvoidPods{
|
|
|
|
PreferAvoidPods: []PreferAvoidPodsEntry{
|
|
|
|
{
|
|
|
|
PodSignature: PodSignature{
|
2016-12-05 03:31:04 +00:00
|
|
|
PodController: &metav1.OwnerReference{
|
2016-11-18 21:34:25 +00:00
|
|
|
APIVersion: "v1",
|
|
|
|
Kind: "ReplicationController",
|
|
|
|
Name: "foo",
|
|
|
|
UID: "abcdef123456",
|
|
|
|
Controller: &controllerFlag,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Reason: "some reason",
|
|
|
|
Message: "some message",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
expectErr: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
node: &Node{
|
|
|
|
// Missing end symbol of "podController" and "podSignature"
|
2017-01-11 20:28:46 +00:00
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
2016-11-18 21:34:25 +00:00
|
|
|
Annotations: map[string]string{
|
|
|
|
PreferAvoidPodsAnnotationKey: `
|
|
|
|
{
|
|
|
|
"preferAvoidPods": [
|
|
|
|
{
|
|
|
|
"podSignature": {
|
|
|
|
"podController": {
|
|
|
|
"kind": "ReplicationController",
|
|
|
|
"apiVersion": "v1"
|
|
|
|
"reason": "some reason",
|
|
|
|
"message": "some message"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}`,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
expectValue: AvoidPods{},
|
|
|
|
expectErr: true,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, tc := range testCases {
|
|
|
|
v, err := GetAvoidPodsFromNodeAnnotations(tc.node.Annotations)
|
|
|
|
if err == nil && tc.expectErr {
|
|
|
|
t.Errorf("[%v]expected error but got none.", i)
|
|
|
|
}
|
|
|
|
if err != nil && !tc.expectErr {
|
|
|
|
t.Errorf("[%v]did not expect error but got: %v", i, err)
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(tc.expectValue, v) {
|
|
|
|
t.Errorf("[%v]expect value %v but got %v with %v", i, tc.expectValue, v, v.PreferAvoidPods[0].PodSignature.PodController.Controller)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestSysctlsFromPodAnnotation(t *testing.T) {
|
|
|
|
type Test struct {
|
|
|
|
annotation string
|
|
|
|
expectValue []Sysctl
|
|
|
|
expectErr bool
|
|
|
|
}
|
|
|
|
for i, test := range []Test{
|
|
|
|
{
|
|
|
|
annotation: "",
|
|
|
|
expectValue: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
annotation: "foo.bar",
|
|
|
|
expectErr: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
annotation: "=123",
|
|
|
|
expectErr: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
annotation: "foo.bar=",
|
|
|
|
expectValue: []Sysctl{{Name: "foo.bar", Value: ""}},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
annotation: "foo.bar=42",
|
|
|
|
expectValue: []Sysctl{{Name: "foo.bar", Value: "42"}},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
annotation: "foo.bar=42,",
|
|
|
|
expectErr: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
annotation: "foo.bar=42,abc.def=1",
|
|
|
|
expectValue: []Sysctl{{Name: "foo.bar", Value: "42"}, {Name: "abc.def", Value: "1"}},
|
|
|
|
},
|
|
|
|
} {
|
|
|
|
sysctls, err := SysctlsFromPodAnnotation(test.annotation)
|
|
|
|
if test.expectErr && err == nil {
|
|
|
|
t.Errorf("[%v]expected error but got none", i)
|
|
|
|
} else if !test.expectErr && err != nil {
|
|
|
|
t.Errorf("[%v]did not expect error but got: %v", i, err)
|
|
|
|
} else if !reflect.DeepEqual(sysctls, test.expectValue) {
|
|
|
|
t.Errorf("[%v]expect value %v but got %v", i, test.expectValue, sysctls)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-02-09 21:12:42 +00:00
|
|
|
|
2017-02-16 17:38:03 +00:00
|
|
|
// TODO: remove when alpha support for affinity is removed
|
2017-02-09 21:12:42 +00:00
|
|
|
func TestGetAffinityFromPodAnnotations(t *testing.T) {
|
|
|
|
testCases := []struct {
|
|
|
|
pod *Pod
|
|
|
|
expectErr bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
pod: &Pod{},
|
|
|
|
expectErr: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
pod: &Pod{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Annotations: map[string]string{
|
|
|
|
AffinityAnnotationKey: `
|
|
|
|
{"nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": {
|
|
|
|
"nodeSelectorTerms": [{
|
|
|
|
"matchExpressions": [{
|
|
|
|
"key": "foo",
|
|
|
|
"operator": "In",
|
|
|
|
"values": ["value1", "value2"]
|
|
|
|
}]
|
|
|
|
}]
|
|
|
|
}}}`,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
expectErr: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
pod: &Pod{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Annotations: map[string]string{
|
|
|
|
AffinityAnnotationKey: `
|
|
|
|
{"nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": {
|
|
|
|
"nodeSelectorTerms": [{
|
|
|
|
"matchExpressions": [{
|
|
|
|
"key": "foo",
|
|
|
|
`,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
expectErr: true,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, tc := range testCases {
|
|
|
|
_, err := GetAffinityFromPodAnnotations(tc.pod.Annotations)
|
|
|
|
if err == nil && tc.expectErr {
|
|
|
|
t.Errorf("[%v]expected error but got none.", i)
|
|
|
|
}
|
|
|
|
if err != nil && !tc.expectErr {
|
|
|
|
t.Errorf("[%v]did not expect error but got: %v", i, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|