mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-10-31 10:18:13 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			317 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			317 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2017 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package controller
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"reflect"
 | |
| 	"strings"
 | |
| 	"testing"
 | |
| 
 | |
| 	"github.com/google/go-cmp/cmp"
 | |
| 	apps "k8s.io/api/apps/v1"
 | |
| 	"k8s.io/api/core/v1"
 | |
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | |
| 	"k8s.io/apimachinery/pkg/labels"
 | |
| 	"k8s.io/apimachinery/pkg/runtime/schema"
 | |
| 	"k8s.io/apimachinery/pkg/types"
 | |
| )
 | |
| 
 | |
| var (
 | |
| 	productionLabel         = map[string]string{"type": "production"}
 | |
| 	testLabel               = map[string]string{"type": "testing"}
 | |
| 	productionLabelSelector = labels.Set{"type": "production"}.AsSelector()
 | |
| 	controllerUID           = "123"
 | |
| )
 | |
| 
 | |
| func newPod(podName string, label map[string]string, owner metav1.Object) *v1.Pod {
 | |
| 	pod := &v1.Pod{
 | |
| 		ObjectMeta: metav1.ObjectMeta{
 | |
| 			Name:      podName,
 | |
| 			Labels:    label,
 | |
| 			Namespace: metav1.NamespaceDefault,
 | |
| 		},
 | |
| 		Spec: v1.PodSpec{
 | |
| 			Containers: []v1.Container{
 | |
| 				{
 | |
| 					Image: "foo/bar",
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 	if owner != nil {
 | |
| 		pod.OwnerReferences = []metav1.OwnerReference{*metav1.NewControllerRef(owner, apps.SchemeGroupVersion.WithKind("Fake"))}
 | |
| 	}
 | |
| 	return pod
 | |
| }
 | |
| 
 | |
| func TestClaimPods(t *testing.T) {
 | |
| 	controllerKind := schema.GroupVersionKind{}
 | |
| 	type test struct {
 | |
| 		name    string
 | |
| 		manager *PodControllerRefManager
 | |
| 		pods    []*v1.Pod
 | |
| 		claimed []*v1.Pod
 | |
| 		patches int
 | |
| 	}
 | |
| 	var tests = []test{
 | |
| 		func() test {
 | |
| 			controller := v1.ReplicationController{}
 | |
| 			controller.Namespace = metav1.NamespaceDefault
 | |
| 			return test{
 | |
| 				name: "Claim pods with correct label",
 | |
| 				manager: NewPodControllerRefManager(&FakePodControl{},
 | |
| 					&controller,
 | |
| 					productionLabelSelector,
 | |
| 					controllerKind,
 | |
| 					func(ctx context.Context) error { return nil }),
 | |
| 				pods:    []*v1.Pod{newPod("pod1", productionLabel, nil), newPod("pod2", testLabel, nil)},
 | |
| 				claimed: []*v1.Pod{newPod("pod1", productionLabel, nil)},
 | |
| 				patches: 1,
 | |
| 			}
 | |
| 		}(),
 | |
| 		func() test {
 | |
| 			controller := v1.ReplicationController{}
 | |
| 			controller.Namespace = metav1.NamespaceDefault
 | |
| 			controller.UID = types.UID(controllerUID)
 | |
| 			now := metav1.Now()
 | |
| 			controller.DeletionTimestamp = &now
 | |
| 			return test{
 | |
| 				name: "Controller marked for deletion can not claim pods",
 | |
| 				manager: NewPodControllerRefManager(&FakePodControl{},
 | |
| 					&controller,
 | |
| 					productionLabelSelector,
 | |
| 					controllerKind,
 | |
| 					func(ctx context.Context) error { return nil }),
 | |
| 				pods:    []*v1.Pod{newPod("pod1", productionLabel, nil), newPod("pod2", productionLabel, nil)},
 | |
| 				claimed: nil,
 | |
| 			}
 | |
| 		}(),
 | |
| 		func() test {
 | |
| 			controller := v1.ReplicationController{}
 | |
| 			controller.Namespace = metav1.NamespaceDefault
 | |
| 			controller.UID = types.UID(controllerUID)
 | |
| 			now := metav1.Now()
 | |
| 			controller.DeletionTimestamp = &now
 | |
| 			return test{
 | |
| 				name: "Controller marked for deletion can not claim new pods",
 | |
| 				manager: NewPodControllerRefManager(&FakePodControl{},
 | |
| 					&controller,
 | |
| 					productionLabelSelector,
 | |
| 					controllerKind,
 | |
| 					func(ctx context.Context) error { return nil }),
 | |
| 				pods:    []*v1.Pod{newPod("pod1", productionLabel, &controller), newPod("pod2", productionLabel, nil)},
 | |
| 				claimed: []*v1.Pod{newPod("pod1", productionLabel, &controller)},
 | |
| 			}
 | |
| 		}(),
 | |
| 		func() test {
 | |
| 			controller := v1.ReplicationController{}
 | |
| 			controller2 := v1.ReplicationController{}
 | |
| 			controller.UID = types.UID(controllerUID)
 | |
| 			controller.Namespace = metav1.NamespaceDefault
 | |
| 			controller2.UID = types.UID("AAAAA")
 | |
| 			controller2.Namespace = metav1.NamespaceDefault
 | |
| 			return test{
 | |
| 				name: "Controller can not claim pods owned by another controller",
 | |
| 				manager: NewPodControllerRefManager(&FakePodControl{},
 | |
| 					&controller,
 | |
| 					productionLabelSelector,
 | |
| 					controllerKind,
 | |
| 					func(ctx context.Context) error { return nil }),
 | |
| 				pods:    []*v1.Pod{newPod("pod1", productionLabel, &controller), newPod("pod2", productionLabel, &controller2)},
 | |
| 				claimed: []*v1.Pod{newPod("pod1", productionLabel, &controller)},
 | |
| 			}
 | |
| 		}(),
 | |
| 		func() test {
 | |
| 			controller := v1.ReplicationController{}
 | |
| 			controller.Namespace = metav1.NamespaceDefault
 | |
| 			controller.UID = types.UID(controllerUID)
 | |
| 			return test{
 | |
| 				name: "Controller releases claimed pods when selector doesn't match",
 | |
| 				manager: NewPodControllerRefManager(&FakePodControl{},
 | |
| 					&controller,
 | |
| 					productionLabelSelector,
 | |
| 					controllerKind,
 | |
| 					func(ctx context.Context) error { return nil }),
 | |
| 				pods:    []*v1.Pod{newPod("pod1", productionLabel, &controller), newPod("pod2", testLabel, &controller)},
 | |
| 				claimed: []*v1.Pod{newPod("pod1", productionLabel, &controller)},
 | |
| 				patches: 1,
 | |
| 			}
 | |
| 		}(),
 | |
| 		func() test {
 | |
| 			controller := v1.ReplicationController{}
 | |
| 			controller.Namespace = metav1.NamespaceDefault
 | |
| 			controller.UID = types.UID(controllerUID)
 | |
| 			podToDelete1 := newPod("pod1", productionLabel, &controller)
 | |
| 			podToDelete2 := newPod("pod2", productionLabel, nil)
 | |
| 			now := metav1.Now()
 | |
| 			podToDelete1.DeletionTimestamp = &now
 | |
| 			podToDelete2.DeletionTimestamp = &now
 | |
| 
 | |
| 			return test{
 | |
| 				name: "Controller does not claim orphaned pods marked for deletion",
 | |
| 				manager: NewPodControllerRefManager(&FakePodControl{},
 | |
| 					&controller,
 | |
| 					productionLabelSelector,
 | |
| 					controllerKind,
 | |
| 					func(ctx context.Context) error { return nil }),
 | |
| 				pods:    []*v1.Pod{podToDelete1, podToDelete2},
 | |
| 				claimed: []*v1.Pod{podToDelete1},
 | |
| 			}
 | |
| 		}(),
 | |
| 		func() test {
 | |
| 			controller := v1.ReplicationController{}
 | |
| 			controller.Namespace = metav1.NamespaceDefault
 | |
| 			controller.UID = types.UID(controllerUID)
 | |
| 			return test{
 | |
| 				name: "Controller claims or release pods according to selector with finalizers",
 | |
| 				manager: NewPodControllerRefManager(&FakePodControl{},
 | |
| 					&controller,
 | |
| 					productionLabelSelector,
 | |
| 					controllerKind,
 | |
| 					func(ctx context.Context) error { return nil },
 | |
| 					"foo-finalizer", "bar-finalizer"),
 | |
| 				pods:    []*v1.Pod{newPod("pod1", productionLabel, &controller), newPod("pod2", testLabel, &controller), newPod("pod3", productionLabel, nil)},
 | |
| 				claimed: []*v1.Pod{newPod("pod1", productionLabel, &controller), newPod("pod3", productionLabel, nil)},
 | |
| 				patches: 2,
 | |
| 			}
 | |
| 		}(),
 | |
| 		func() test {
 | |
| 			controller := v1.ReplicationController{}
 | |
| 			controller.Namespace = metav1.NamespaceDefault
 | |
| 			controller.UID = types.UID(controllerUID)
 | |
| 			pod1 := newPod("pod1", productionLabel, nil)
 | |
| 			pod2 := newPod("pod2", productionLabel, nil)
 | |
| 			pod2.Namespace = "fakens"
 | |
| 			return test{
 | |
| 				name: "Controller does not claim pods of different namespace",
 | |
| 				manager: NewPodControllerRefManager(&FakePodControl{},
 | |
| 					&controller,
 | |
| 					productionLabelSelector,
 | |
| 					controllerKind,
 | |
| 					func(ctx context.Context) error { return nil }),
 | |
| 				pods:    []*v1.Pod{pod1, pod2},
 | |
| 				claimed: []*v1.Pod{pod1},
 | |
| 				patches: 1,
 | |
| 			}
 | |
| 		}(),
 | |
| 		func() test {
 | |
| 			// act as a cluster-scoped controller
 | |
| 			controller := v1.ReplicationController{}
 | |
| 			controller.Namespace = ""
 | |
| 			controller.UID = types.UID(controllerUID)
 | |
| 			pod1 := newPod("pod1", productionLabel, nil)
 | |
| 			pod2 := newPod("pod2", productionLabel, nil)
 | |
| 			pod2.Namespace = "fakens"
 | |
| 			return test{
 | |
| 				name: "Cluster scoped controller claims pods of specified namespace",
 | |
| 				manager: NewPodControllerRefManager(&FakePodControl{},
 | |
| 					&controller,
 | |
| 					productionLabelSelector,
 | |
| 					controllerKind,
 | |
| 					func(ctx context.Context) error { return nil }),
 | |
| 				pods:    []*v1.Pod{pod1, pod2},
 | |
| 				claimed: []*v1.Pod{pod1, pod2},
 | |
| 				patches: 2,
 | |
| 			}
 | |
| 		}(),
 | |
| 	}
 | |
| 	for _, test := range tests {
 | |
| 		t.Run(test.name, func(t *testing.T) {
 | |
| 			claimed, err := test.manager.ClaimPods(context.TODO(), test.pods)
 | |
| 			if err != nil {
 | |
| 				t.Fatalf("Unexpected error: %v", err)
 | |
| 			}
 | |
| 			if diff := cmp.Diff(test.claimed, claimed); diff != "" {
 | |
| 				t.Errorf("Claimed wrong pods (-want,+got):\n%s", diff)
 | |
| 			}
 | |
| 			fakePodControl, ok := test.manager.podControl.(*FakePodControl)
 | |
| 			if !ok {
 | |
| 				return
 | |
| 			}
 | |
| 			if p := len(fakePodControl.Patches); p != test.patches {
 | |
| 				t.Errorf("ClaimPods issues %d patches, want %d", p, test.patches)
 | |
| 			}
 | |
| 			for _, p := range fakePodControl.Patches {
 | |
| 				patch := string(p)
 | |
| 				if uid := string(test.manager.Controller.GetUID()); !strings.Contains(patch, uid) {
 | |
| 					t.Errorf("Patch doesn't contain controller UID %s", uid)
 | |
| 				}
 | |
| 				for _, f := range test.manager.finalizers {
 | |
| 					if !strings.Contains(patch, f) {
 | |
| 						t.Errorf("Patch doesn't contain finalizer %s, %q", patch, f)
 | |
| 					}
 | |
| 				}
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestGeneratePatchBytesForDelete(t *testing.T) {
 | |
| 	tests := []struct {
 | |
| 		name         string
 | |
| 		ownerUID     []types.UID
 | |
| 		dependentUID types.UID
 | |
| 		finalizers   []string
 | |
| 		want         []byte
 | |
| 	}{
 | |
| 		{
 | |
| 			name:         "check the structure of patch bytes",
 | |
| 			ownerUID:     []types.UID{"ss1"},
 | |
| 			dependentUID: "ss2",
 | |
| 			finalizers:   []string{},
 | |
| 			want:         []byte(`{"metadata":{"uid":"ss2","ownerReferences":[{"$patch":"delete","uid":"ss1"}]}}`),
 | |
| 		},
 | |
| 		{
 | |
| 			name:         "check if parent uid is escaped",
 | |
| 			ownerUID:     []types.UID{`ss1"hello`},
 | |
| 			dependentUID: "ss2",
 | |
| 			finalizers:   []string{},
 | |
| 			want:         []byte(`{"metadata":{"uid":"ss2","ownerReferences":[{"$patch":"delete","uid":"ss1\"hello"}]}}`),
 | |
| 		},
 | |
| 		{
 | |
| 			name:         "check if revision uid uid is escaped",
 | |
| 			ownerUID:     []types.UID{`ss1`},
 | |
| 			dependentUID: `ss2"hello`,
 | |
| 			finalizers:   []string{},
 | |
| 			want:         []byte(`{"metadata":{"uid":"ss2\"hello","ownerReferences":[{"$patch":"delete","uid":"ss1"}]}}`),
 | |
| 		},
 | |
| 		{
 | |
| 			name:         "check the structure of patch bytes with multiple owners",
 | |
| 			ownerUID:     []types.UID{"ss1", "ss2"},
 | |
| 			dependentUID: "ss2",
 | |
| 			finalizers:   []string{},
 | |
| 			want:         []byte(`{"metadata":{"uid":"ss2","ownerReferences":[{"$patch":"delete","uid":"ss1"},{"$patch":"delete","uid":"ss2"}]}}`),
 | |
| 		},
 | |
| 		{
 | |
| 			name:         "check the structure of patch bytes with a finalizer and multiple owners",
 | |
| 			ownerUID:     []types.UID{"ss1", "ss2"},
 | |
| 			dependentUID: "ss2",
 | |
| 			finalizers:   []string{"f1"},
 | |
| 			want:         []byte(`{"metadata":{"uid":"ss2","ownerReferences":[{"$patch":"delete","uid":"ss1"},{"$patch":"delete","uid":"ss2"}],"$deleteFromPrimitiveList/finalizers":["f1"]}}`),
 | |
| 		},
 | |
| 	}
 | |
| 	for _, tt := range tests {
 | |
| 		t.Run(tt.name, func(t *testing.T) {
 | |
| 			got, _ := GenerateDeleteOwnerRefStrategicMergeBytes(tt.dependentUID, tt.ownerUID, tt.finalizers...)
 | |
| 			if !reflect.DeepEqual(got, tt.want) {
 | |
| 				t.Errorf("generatePatchBytesForDelete() got = %s, want %s", got, tt.want)
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| }
 | 
