mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-04 04:08:16 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			5007 lines
		
	
	
		
			152 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			5007 lines
		
	
	
		
			152 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2014 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package predicates
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
	"os"
 | 
						|
	"reflect"
 | 
						|
	"strconv"
 | 
						|
	"strings"
 | 
						|
	"testing"
 | 
						|
 | 
						|
	"k8s.io/api/core/v1"
 | 
						|
	storagev1 "k8s.io/api/storage/v1"
 | 
						|
	"k8s.io/apimachinery/pkg/api/resource"
 | 
						|
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						|
	"k8s.io/apimachinery/pkg/util/sets"
 | 
						|
	v1helper "k8s.io/kubernetes/pkg/apis/core/v1/helper"
 | 
						|
	kubeletapis "k8s.io/kubernetes/pkg/kubelet/apis"
 | 
						|
	schedulerapi "k8s.io/kubernetes/pkg/scheduler/api"
 | 
						|
	schedulernodeinfo "k8s.io/kubernetes/pkg/scheduler/nodeinfo"
 | 
						|
	schedulertesting "k8s.io/kubernetes/pkg/scheduler/testing"
 | 
						|
)
 | 
						|
 | 
						|
var (
 | 
						|
	extendedResourceA     = v1.ResourceName("example.com/aaa")
 | 
						|
	extendedResourceB     = v1.ResourceName("example.com/bbb")
 | 
						|
	kubernetesIOResourceA = v1.ResourceName("kubernetes.io/something")
 | 
						|
	kubernetesIOResourceB = v1.ResourceName("subdomain.kubernetes.io/something")
 | 
						|
	hugePageResourceA     = v1helper.HugePageResourceName(resource.MustParse("2Mi"))
 | 
						|
)
 | 
						|
 | 
						|
func makeResources(milliCPU, memory, pods, extendedA, storage, hugePageA int64) v1.NodeResources {
 | 
						|
	return v1.NodeResources{
 | 
						|
		Capacity: v1.ResourceList{
 | 
						|
			v1.ResourceCPU:              *resource.NewMilliQuantity(milliCPU, resource.DecimalSI),
 | 
						|
			v1.ResourceMemory:           *resource.NewQuantity(memory, resource.BinarySI),
 | 
						|
			v1.ResourcePods:             *resource.NewQuantity(pods, resource.DecimalSI),
 | 
						|
			extendedResourceA:           *resource.NewQuantity(extendedA, resource.DecimalSI),
 | 
						|
			v1.ResourceEphemeralStorage: *resource.NewQuantity(storage, resource.BinarySI),
 | 
						|
			hugePageResourceA:           *resource.NewQuantity(hugePageA, resource.BinarySI),
 | 
						|
		},
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func makeAllocatableResources(milliCPU, memory, pods, extendedA, storage, hugePageA int64) v1.ResourceList {
 | 
						|
	return v1.ResourceList{
 | 
						|
		v1.ResourceCPU:              *resource.NewMilliQuantity(milliCPU, resource.DecimalSI),
 | 
						|
		v1.ResourceMemory:           *resource.NewQuantity(memory, resource.BinarySI),
 | 
						|
		v1.ResourcePods:             *resource.NewQuantity(pods, resource.DecimalSI),
 | 
						|
		extendedResourceA:           *resource.NewQuantity(extendedA, resource.DecimalSI),
 | 
						|
		v1.ResourceEphemeralStorage: *resource.NewQuantity(storage, resource.BinarySI),
 | 
						|
		hugePageResourceA:           *resource.NewQuantity(hugePageA, resource.BinarySI),
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func newResourcePod(usage ...schedulernodeinfo.Resource) *v1.Pod {
 | 
						|
	containers := []v1.Container{}
 | 
						|
	for _, req := range usage {
 | 
						|
		containers = append(containers, v1.Container{
 | 
						|
			Resources: v1.ResourceRequirements{Requests: req.ResourceList()},
 | 
						|
		})
 | 
						|
	}
 | 
						|
	return &v1.Pod{
 | 
						|
		Spec: v1.PodSpec{
 | 
						|
			Containers: containers,
 | 
						|
		},
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func newResourceInitPod(pod *v1.Pod, usage ...schedulernodeinfo.Resource) *v1.Pod {
 | 
						|
	pod.Spec.InitContainers = newResourcePod(usage...).Spec.Containers
 | 
						|
	return pod
 | 
						|
}
 | 
						|
 | 
						|
func GetPredicateMetadata(p *v1.Pod, nodeInfo map[string]*schedulernodeinfo.NodeInfo) PredicateMetadata {
 | 
						|
	pm := PredicateMetadataFactory{schedulertesting.FakePodLister{p}}
 | 
						|
	return pm.GetMetadata(p, nodeInfo)
 | 
						|
}
 | 
						|
 | 
						|
func TestPodFitsResources(t *testing.T) {
 | 
						|
	enoughPodsTests := []struct {
 | 
						|
		pod                      *v1.Pod
 | 
						|
		nodeInfo                 *schedulernodeinfo.NodeInfo
 | 
						|
		fits                     bool
 | 
						|
		name                     string
 | 
						|
		reasons                  []PredicateFailureReason
 | 
						|
		ignoredExtendedResources sets.String
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{},
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 10, Memory: 20})),
 | 
						|
			fits: true,
 | 
						|
			name: "no resources requested always fits",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourcePod(schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 10, Memory: 20})),
 | 
						|
			fits: false,
 | 
						|
			name: "too many resources fails",
 | 
						|
			reasons: []PredicateFailureReason{
 | 
						|
				NewInsufficientResourceError(v1.ResourceCPU, 1, 10, 10),
 | 
						|
				NewInsufficientResourceError(v1.ResourceMemory, 1, 20, 20),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourceInitPod(newResourcePod(schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1}), schedulernodeinfo.Resource{MilliCPU: 3, Memory: 1}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 8, Memory: 19})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "too many resources fails due to init container cpu",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(v1.ResourceCPU, 3, 8, 10)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourceInitPod(newResourcePod(schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1}), schedulernodeinfo.Resource{MilliCPU: 3, Memory: 1}, schedulernodeinfo.Resource{MilliCPU: 2, Memory: 1}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 8, Memory: 19})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "too many resources fails due to highest init container cpu",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(v1.ResourceCPU, 3, 8, 10)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourceInitPod(newResourcePod(schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1}), schedulernodeinfo.Resource{MilliCPU: 1, Memory: 3}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 9, Memory: 19})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "too many resources fails due to init container memory",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(v1.ResourceMemory, 3, 19, 20)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourceInitPod(newResourcePod(schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1}), schedulernodeinfo.Resource{MilliCPU: 1, Memory: 3}, schedulernodeinfo.Resource{MilliCPU: 1, Memory: 2}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 9, Memory: 19})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "too many resources fails due to highest init container memory",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(v1.ResourceMemory, 3, 19, 20)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourceInitPod(newResourcePod(schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1}), schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 9, Memory: 19})),
 | 
						|
			fits: true,
 | 
						|
			name: "init container fits because it's the max, not sum, of containers and init containers",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourceInitPod(newResourcePod(schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1}), schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1}, schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 9, Memory: 19})),
 | 
						|
			fits: true,
 | 
						|
			name: "multiple init containers fit because it's the max, not sum, of containers and init containers",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourcePod(schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 5, Memory: 5})),
 | 
						|
			fits: true,
 | 
						|
			name: "both resources fit",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourcePod(schedulernodeinfo.Resource{MilliCPU: 2, Memory: 1}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 9, Memory: 5})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "one resource memory fits",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(v1.ResourceCPU, 2, 9, 10)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourcePod(schedulernodeinfo.Resource{MilliCPU: 1, Memory: 2}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 5, Memory: 19})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "one resource cpu fits",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(v1.ResourceMemory, 2, 19, 20)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourcePod(schedulernodeinfo.Resource{MilliCPU: 5, Memory: 1}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 5, Memory: 19})),
 | 
						|
			fits: true,
 | 
						|
			name: "equal edge case",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourceInitPod(newResourcePod(schedulernodeinfo.Resource{MilliCPU: 4, Memory: 1}), schedulernodeinfo.Resource{MilliCPU: 5, Memory: 1}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 5, Memory: 19})),
 | 
						|
			fits: true,
 | 
						|
			name: "equal edge case for init container",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod:      newResourcePod(schedulernodeinfo.Resource{ScalarResources: map[v1.ResourceName]int64{extendedResourceA: 1}}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(newResourcePod(schedulernodeinfo.Resource{})),
 | 
						|
			fits:     true,
 | 
						|
			name:     "extended resource fits",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod:      newResourceInitPod(newResourcePod(schedulernodeinfo.Resource{}), schedulernodeinfo.Resource{ScalarResources: map[v1.ResourceName]int64{extendedResourceA: 1}}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(newResourcePod(schedulernodeinfo.Resource{})),
 | 
						|
			fits:     true,
 | 
						|
			name:     "extended resource fits for init container",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourcePod(
 | 
						|
				schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1, ScalarResources: map[v1.ResourceName]int64{extendedResourceA: 10}}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 0, Memory: 0, ScalarResources: map[v1.ResourceName]int64{extendedResourceA: 0}})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "extended resource capacity enforced",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(extendedResourceA, 10, 0, 5)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourceInitPod(newResourcePod(schedulernodeinfo.Resource{}),
 | 
						|
				schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1, ScalarResources: map[v1.ResourceName]int64{extendedResourceA: 10}}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 0, Memory: 0, ScalarResources: map[v1.ResourceName]int64{extendedResourceA: 0}})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "extended resource capacity enforced for init container",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(extendedResourceA, 10, 0, 5)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourcePod(
 | 
						|
				schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1, ScalarResources: map[v1.ResourceName]int64{extendedResourceA: 1}}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 0, Memory: 0, ScalarResources: map[v1.ResourceName]int64{extendedResourceA: 5}})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "extended resource allocatable enforced",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(extendedResourceA, 1, 5, 5)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourceInitPod(newResourcePod(schedulernodeinfo.Resource{}),
 | 
						|
				schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1, ScalarResources: map[v1.ResourceName]int64{extendedResourceA: 1}}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 0, Memory: 0, ScalarResources: map[v1.ResourceName]int64{extendedResourceA: 5}})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "extended resource allocatable enforced for init container",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(extendedResourceA, 1, 5, 5)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourcePod(
 | 
						|
				schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1, ScalarResources: map[v1.ResourceName]int64{extendedResourceA: 3}},
 | 
						|
				schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1, ScalarResources: map[v1.ResourceName]int64{extendedResourceA: 3}}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 0, Memory: 0, ScalarResources: map[v1.ResourceName]int64{extendedResourceA: 2}})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "extended resource allocatable enforced for multiple containers",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(extendedResourceA, 6, 2, 5)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourceInitPod(newResourcePod(schedulernodeinfo.Resource{}),
 | 
						|
				schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1, ScalarResources: map[v1.ResourceName]int64{extendedResourceA: 3}},
 | 
						|
				schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1, ScalarResources: map[v1.ResourceName]int64{extendedResourceA: 3}}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 0, Memory: 0, ScalarResources: map[v1.ResourceName]int64{extendedResourceA: 2}})),
 | 
						|
			fits: true,
 | 
						|
			name: "extended resource allocatable admits multiple init containers",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourceInitPod(newResourcePod(schedulernodeinfo.Resource{}),
 | 
						|
				schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1, ScalarResources: map[v1.ResourceName]int64{extendedResourceA: 6}},
 | 
						|
				schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1, ScalarResources: map[v1.ResourceName]int64{extendedResourceA: 3}}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 0, Memory: 0, ScalarResources: map[v1.ResourceName]int64{extendedResourceA: 2}})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "extended resource allocatable enforced for multiple init containers",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(extendedResourceA, 6, 2, 5)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourcePod(
 | 
						|
				schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1, ScalarResources: map[v1.ResourceName]int64{extendedResourceB: 1}}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 0, Memory: 0})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "extended resource allocatable enforced for unknown resource",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(extendedResourceB, 1, 0, 0)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourceInitPod(newResourcePod(schedulernodeinfo.Resource{}),
 | 
						|
				schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1, ScalarResources: map[v1.ResourceName]int64{extendedResourceB: 1}}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 0, Memory: 0})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "extended resource allocatable enforced for unknown resource for init container",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(extendedResourceB, 1, 0, 0)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourcePod(
 | 
						|
				schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1, ScalarResources: map[v1.ResourceName]int64{kubernetesIOResourceA: 10}}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 0, Memory: 0})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "kubernetes.io resource capacity enforced",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(kubernetesIOResourceA, 10, 0, 0)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourceInitPod(newResourcePod(schedulernodeinfo.Resource{}),
 | 
						|
				schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1, ScalarResources: map[v1.ResourceName]int64{kubernetesIOResourceB: 10}}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 0, Memory: 0})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "kubernetes.io resource capacity enforced for init container",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(kubernetesIOResourceB, 10, 0, 0)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourcePod(
 | 
						|
				schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1, ScalarResources: map[v1.ResourceName]int64{hugePageResourceA: 10}}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 0, Memory: 0, ScalarResources: map[v1.ResourceName]int64{hugePageResourceA: 0}})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "hugepages resource capacity enforced",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(hugePageResourceA, 10, 0, 5)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourceInitPod(newResourcePod(schedulernodeinfo.Resource{}),
 | 
						|
				schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1, ScalarResources: map[v1.ResourceName]int64{hugePageResourceA: 10}}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 0, Memory: 0, ScalarResources: map[v1.ResourceName]int64{hugePageResourceA: 0}})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "hugepages resource capacity enforced for init container",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(hugePageResourceA, 10, 0, 5)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourcePod(
 | 
						|
				schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1, ScalarResources: map[v1.ResourceName]int64{hugePageResourceA: 3}},
 | 
						|
				schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1, ScalarResources: map[v1.ResourceName]int64{hugePageResourceA: 3}}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 0, Memory: 0, ScalarResources: map[v1.ResourceName]int64{hugePageResourceA: 2}})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "hugepages resource allocatable enforced for multiple containers",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(hugePageResourceA, 6, 2, 5)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourcePod(
 | 
						|
				schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1, ScalarResources: map[v1.ResourceName]int64{extendedResourceB: 1}}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 0, Memory: 0})),
 | 
						|
			fits:                     true,
 | 
						|
			ignoredExtendedResources: sets.NewString(string(extendedResourceB)),
 | 
						|
			name:                     "skip checking ignored extended resource",
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, test := range enoughPodsTests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			node := v1.Node{Status: v1.NodeStatus{Capacity: makeResources(10, 20, 32, 5, 20, 5).Capacity, Allocatable: makeAllocatableResources(10, 20, 32, 5, 20, 5)}}
 | 
						|
			test.nodeInfo.SetNode(&node)
 | 
						|
			RegisterPredicateMetadataProducerWithExtendedResourceOptions(test.ignoredExtendedResources)
 | 
						|
			meta := GetPredicateMetadata(test.pod, nil)
 | 
						|
			fits, reasons, err := PodFitsResources(test.pod, meta, test.nodeInfo)
 | 
						|
			if err != nil {
 | 
						|
				t.Errorf("unexpected error: %v", err)
 | 
						|
			}
 | 
						|
			if !fits && !reflect.DeepEqual(reasons, test.reasons) {
 | 
						|
				t.Errorf("unexpected failure reasons: %v, want: %v", reasons, test.reasons)
 | 
						|
			}
 | 
						|
			if fits != test.fits {
 | 
						|
				t.Errorf("expected: %v got %v", test.fits, fits)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
 | 
						|
	notEnoughPodsTests := []struct {
 | 
						|
		pod      *v1.Pod
 | 
						|
		nodeInfo *schedulernodeinfo.NodeInfo
 | 
						|
		fits     bool
 | 
						|
		name     string
 | 
						|
		reasons  []PredicateFailureReason
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{},
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 10, Memory: 20})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "even without specified resources predicate fails when there's no space for additional pod",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(v1.ResourcePods, 1, 1, 1)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourcePod(schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 5, Memory: 5})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "even if both resources fit predicate fails when there's no space for additional pod",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(v1.ResourcePods, 1, 1, 1)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourcePod(schedulernodeinfo.Resource{MilliCPU: 5, Memory: 1}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 5, Memory: 19})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "even for equal edge case predicate fails when there's no space for additional pod",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(v1.ResourcePods, 1, 1, 1)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourceInitPod(newResourcePod(schedulernodeinfo.Resource{MilliCPU: 5, Memory: 1}), schedulernodeinfo.Resource{MilliCPU: 5, Memory: 1}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 5, Memory: 19})),
 | 
						|
			fits:    false,
 | 
						|
			name:    "even for equal edge case predicate fails when there's no space for additional pod due to init container",
 | 
						|
			reasons: []PredicateFailureReason{NewInsufficientResourceError(v1.ResourcePods, 1, 1, 1)},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for _, test := range notEnoughPodsTests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			node := v1.Node{Status: v1.NodeStatus{Capacity: v1.ResourceList{}, Allocatable: makeAllocatableResources(10, 20, 1, 0, 0, 0)}}
 | 
						|
			test.nodeInfo.SetNode(&node)
 | 
						|
			fits, reasons, err := PodFitsResources(test.pod, GetPredicateMetadata(test.pod, nil), test.nodeInfo)
 | 
						|
			if err != nil {
 | 
						|
				t.Errorf("unexpected error: %v", err)
 | 
						|
			}
 | 
						|
			if !fits && !reflect.DeepEqual(reasons, test.reasons) {
 | 
						|
				t.Errorf("unexpected failure reasons: %v, want: %v", reasons, test.reasons)
 | 
						|
			}
 | 
						|
			if fits != test.fits {
 | 
						|
				t.Errorf("expected: %v got %v", test.fits, fits)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
 | 
						|
	storagePodsTests := []struct {
 | 
						|
		pod      *v1.Pod
 | 
						|
		nodeInfo *schedulernodeinfo.NodeInfo
 | 
						|
		fits     bool
 | 
						|
		name     string
 | 
						|
		reasons  []PredicateFailureReason
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			pod: newResourcePod(schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 10, Memory: 10})),
 | 
						|
			fits: false,
 | 
						|
			name: "due to container scratch disk",
 | 
						|
			reasons: []PredicateFailureReason{
 | 
						|
				NewInsufficientResourceError(v1.ResourceCPU, 1, 10, 10),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourcePod(schedulernodeinfo.Resource{MilliCPU: 1, Memory: 1}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 2, Memory: 10})),
 | 
						|
			fits: true,
 | 
						|
			name: "pod fit",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourcePod(schedulernodeinfo.Resource{EphemeralStorage: 25}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 2, Memory: 2})),
 | 
						|
			fits: false,
 | 
						|
			name: "storage ephemeral local storage request exceeds allocatable",
 | 
						|
			reasons: []PredicateFailureReason{
 | 
						|
				NewInsufficientResourceError(v1.ResourceEphemeralStorage, 25, 0, 20),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourcePod(schedulernodeinfo.Resource{EphemeralStorage: 10}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 2, Memory: 2})),
 | 
						|
			fits: true,
 | 
						|
			name: "pod fits",
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, test := range storagePodsTests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			node := v1.Node{Status: v1.NodeStatus{Capacity: makeResources(10, 20, 32, 5, 20, 5).Capacity, Allocatable: makeAllocatableResources(10, 20, 32, 5, 20, 5)}}
 | 
						|
			test.nodeInfo.SetNode(&node)
 | 
						|
			fits, reasons, err := PodFitsResources(test.pod, GetPredicateMetadata(test.pod, nil), test.nodeInfo)
 | 
						|
			if err != nil {
 | 
						|
				t.Errorf("unexpected error: %v", err)
 | 
						|
			}
 | 
						|
			if !fits && !reflect.DeepEqual(reasons, test.reasons) {
 | 
						|
				t.Errorf("unexpected failure reasons: %v, want: %v", reasons, test.reasons)
 | 
						|
			}
 | 
						|
			if fits != test.fits {
 | 
						|
				t.Errorf("expected: %v got %v", test.fits, fits)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
 | 
						|
}
 | 
						|
 | 
						|
func TestPodFitsHost(t *testing.T) {
 | 
						|
	tests := []struct {
 | 
						|
		pod  *v1.Pod
 | 
						|
		node *v1.Node
 | 
						|
		fits bool
 | 
						|
		name string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			pod:  &v1.Pod{},
 | 
						|
			node: &v1.Node{},
 | 
						|
			fits: true,
 | 
						|
			name: "no host specified",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					NodeName: "foo",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			node: &v1.Node{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			fits: true,
 | 
						|
			name: "host matches",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					NodeName: "bar",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			node: &v1.Node{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			fits: false,
 | 
						|
			name: "host doesn't match",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	expectedFailureReasons := []PredicateFailureReason{ErrPodNotMatchHostName}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			nodeInfo := schedulernodeinfo.NewNodeInfo()
 | 
						|
			nodeInfo.SetNode(test.node)
 | 
						|
			fits, reasons, err := PodFitsHost(test.pod, GetPredicateMetadata(test.pod, nil), nodeInfo)
 | 
						|
			if err != nil {
 | 
						|
				t.Errorf("unexpected error: %v", err)
 | 
						|
			}
 | 
						|
			if !fits && !reflect.DeepEqual(reasons, expectedFailureReasons) {
 | 
						|
				t.Errorf("unexpected failure reasons: %v, want: %v", reasons, expectedFailureReasons)
 | 
						|
			}
 | 
						|
			if fits != test.fits {
 | 
						|
				t.Errorf("unexpected difference: expected: %v got %v", test.fits, fits)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func newPod(host string, hostPortInfos ...string) *v1.Pod {
 | 
						|
	networkPorts := []v1.ContainerPort{}
 | 
						|
	for _, portInfo := range hostPortInfos {
 | 
						|
		splited := strings.Split(portInfo, "/")
 | 
						|
		hostPort, _ := strconv.Atoi(splited[2])
 | 
						|
 | 
						|
		networkPorts = append(networkPorts, v1.ContainerPort{
 | 
						|
			HostIP:   splited[1],
 | 
						|
			HostPort: int32(hostPort),
 | 
						|
			Protocol: v1.Protocol(splited[0]),
 | 
						|
		})
 | 
						|
	}
 | 
						|
	return &v1.Pod{
 | 
						|
		Spec: v1.PodSpec{
 | 
						|
			NodeName: host,
 | 
						|
			Containers: []v1.Container{
 | 
						|
				{
 | 
						|
					Ports: networkPorts,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestPodFitsHostPorts(t *testing.T) {
 | 
						|
	tests := []struct {
 | 
						|
		pod      *v1.Pod
 | 
						|
		nodeInfo *schedulernodeinfo.NodeInfo
 | 
						|
		fits     bool
 | 
						|
		name     string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			pod:      &v1.Pod{},
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(),
 | 
						|
			fits:     true,
 | 
						|
			name:     "nothing running",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newPod("m1", "UDP/127.0.0.1/8080"),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newPod("m1", "UDP/127.0.0.1/9090")),
 | 
						|
			fits: true,
 | 
						|
			name: "other port",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newPod("m1", "UDP/127.0.0.1/8080"),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newPod("m1", "UDP/127.0.0.1/8080")),
 | 
						|
			fits: false,
 | 
						|
			name: "same udp port",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newPod("m1", "TCP/127.0.0.1/8080"),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newPod("m1", "TCP/127.0.0.1/8080")),
 | 
						|
			fits: false,
 | 
						|
			name: "same tcp port",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newPod("m1", "TCP/127.0.0.1/8080"),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newPod("m1", "TCP/127.0.0.2/8080")),
 | 
						|
			fits: true,
 | 
						|
			name: "different host ip",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newPod("m1", "UDP/127.0.0.1/8080"),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newPod("m1", "TCP/127.0.0.1/8080")),
 | 
						|
			fits: true,
 | 
						|
			name: "different protocol",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newPod("m1", "UDP/127.0.0.1/8000", "UDP/127.0.0.1/8080"),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newPod("m1", "UDP/127.0.0.1/8080")),
 | 
						|
			fits: false,
 | 
						|
			name: "second udp port conflict",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newPod("m1", "TCP/127.0.0.1/8001", "UDP/127.0.0.1/8080"),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newPod("m1", "TCP/127.0.0.1/8001", "UDP/127.0.0.1/8081")),
 | 
						|
			fits: false,
 | 
						|
			name: "first tcp port conflict",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newPod("m1", "TCP/0.0.0.0/8001"),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newPod("m1", "TCP/127.0.0.1/8001")),
 | 
						|
			fits: false,
 | 
						|
			name: "first tcp port conflict due to 0.0.0.0 hostIP",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newPod("m1", "TCP/10.0.10.10/8001", "TCP/0.0.0.0/8001"),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newPod("m1", "TCP/127.0.0.1/8001")),
 | 
						|
			fits: false,
 | 
						|
			name: "TCP hostPort conflict due to 0.0.0.0 hostIP",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newPod("m1", "TCP/127.0.0.1/8001"),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newPod("m1", "TCP/0.0.0.0/8001")),
 | 
						|
			fits: false,
 | 
						|
			name: "second tcp port conflict to 0.0.0.0 hostIP",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newPod("m1", "UDP/127.0.0.1/8001"),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newPod("m1", "TCP/0.0.0.0/8001")),
 | 
						|
			fits: true,
 | 
						|
			name: "second different protocol",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newPod("m1", "UDP/127.0.0.1/8001"),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newPod("m1", "TCP/0.0.0.0/8001", "UDP/0.0.0.0/8001")),
 | 
						|
			fits: false,
 | 
						|
			name: "UDP hostPort conflict due to 0.0.0.0 hostIP",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	expectedFailureReasons := []PredicateFailureReason{ErrPodNotFitsHostPorts}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			fits, reasons, err := PodFitsHostPorts(test.pod, GetPredicateMetadata(test.pod, nil), test.nodeInfo)
 | 
						|
			if err != nil {
 | 
						|
				t.Errorf("unexpected error: %v", err)
 | 
						|
			}
 | 
						|
			if !fits && !reflect.DeepEqual(reasons, expectedFailureReasons) {
 | 
						|
				t.Errorf("unexpected failure reasons: %v, want: %v", reasons, expectedFailureReasons)
 | 
						|
			}
 | 
						|
			if test.fits != fits {
 | 
						|
				t.Errorf("expected %v, saw %v", test.fits, fits)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestGCEDiskConflicts(t *testing.T) {
 | 
						|
	volState := v1.PodSpec{
 | 
						|
		Volumes: []v1.Volume{
 | 
						|
			{
 | 
						|
				VolumeSource: v1.VolumeSource{
 | 
						|
					GCEPersistentDisk: &v1.GCEPersistentDiskVolumeSource{
 | 
						|
						PDName: "foo",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	volState2 := v1.PodSpec{
 | 
						|
		Volumes: []v1.Volume{
 | 
						|
			{
 | 
						|
				VolumeSource: v1.VolumeSource{
 | 
						|
					GCEPersistentDisk: &v1.GCEPersistentDiskVolumeSource{
 | 
						|
						PDName: "bar",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	tests := []struct {
 | 
						|
		pod      *v1.Pod
 | 
						|
		nodeInfo *schedulernodeinfo.NodeInfo
 | 
						|
		isOk     bool
 | 
						|
		name     string
 | 
						|
	}{
 | 
						|
		{&v1.Pod{}, schedulernodeinfo.NewNodeInfo(), true, "nothing"},
 | 
						|
		{&v1.Pod{}, schedulernodeinfo.NewNodeInfo(&v1.Pod{Spec: volState}), true, "one state"},
 | 
						|
		{&v1.Pod{Spec: volState}, schedulernodeinfo.NewNodeInfo(&v1.Pod{Spec: volState}), false, "same state"},
 | 
						|
		{&v1.Pod{Spec: volState2}, schedulernodeinfo.NewNodeInfo(&v1.Pod{Spec: volState}), true, "different state"},
 | 
						|
	}
 | 
						|
	expectedFailureReasons := []PredicateFailureReason{ErrDiskConflict}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			ok, reasons, err := NoDiskConflict(test.pod, GetPredicateMetadata(test.pod, nil), test.nodeInfo)
 | 
						|
			if err != nil {
 | 
						|
				t.Errorf("unexpected error: %v", err)
 | 
						|
			}
 | 
						|
			if !ok && !reflect.DeepEqual(reasons, expectedFailureReasons) {
 | 
						|
				t.Errorf("unexpected failure reasons: %v, want: %v", reasons, expectedFailureReasons)
 | 
						|
			}
 | 
						|
			if test.isOk && !ok {
 | 
						|
				t.Errorf("expected ok, got none.  %v %s", test.pod, test.nodeInfo)
 | 
						|
			}
 | 
						|
			if !test.isOk && ok {
 | 
						|
				t.Errorf("expected no ok, got one.  %v %s", test.pod, test.nodeInfo)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestAWSDiskConflicts(t *testing.T) {
 | 
						|
	volState := v1.PodSpec{
 | 
						|
		Volumes: []v1.Volume{
 | 
						|
			{
 | 
						|
				VolumeSource: v1.VolumeSource{
 | 
						|
					AWSElasticBlockStore: &v1.AWSElasticBlockStoreVolumeSource{
 | 
						|
						VolumeID: "foo",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	volState2 := v1.PodSpec{
 | 
						|
		Volumes: []v1.Volume{
 | 
						|
			{
 | 
						|
				VolumeSource: v1.VolumeSource{
 | 
						|
					AWSElasticBlockStore: &v1.AWSElasticBlockStoreVolumeSource{
 | 
						|
						VolumeID: "bar",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	tests := []struct {
 | 
						|
		pod      *v1.Pod
 | 
						|
		nodeInfo *schedulernodeinfo.NodeInfo
 | 
						|
		isOk     bool
 | 
						|
		name     string
 | 
						|
	}{
 | 
						|
		{&v1.Pod{}, schedulernodeinfo.NewNodeInfo(), true, "nothing"},
 | 
						|
		{&v1.Pod{}, schedulernodeinfo.NewNodeInfo(&v1.Pod{Spec: volState}), true, "one state"},
 | 
						|
		{&v1.Pod{Spec: volState}, schedulernodeinfo.NewNodeInfo(&v1.Pod{Spec: volState}), false, "same state"},
 | 
						|
		{&v1.Pod{Spec: volState2}, schedulernodeinfo.NewNodeInfo(&v1.Pod{Spec: volState}), true, "different state"},
 | 
						|
	}
 | 
						|
	expectedFailureReasons := []PredicateFailureReason{ErrDiskConflict}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			ok, reasons, err := NoDiskConflict(test.pod, GetPredicateMetadata(test.pod, nil), test.nodeInfo)
 | 
						|
			if err != nil {
 | 
						|
				t.Errorf("unexpected error: %v", err)
 | 
						|
			}
 | 
						|
			if !ok && !reflect.DeepEqual(reasons, expectedFailureReasons) {
 | 
						|
				t.Errorf("unexpected failure reasons: %v, want: %v", reasons, expectedFailureReasons)
 | 
						|
			}
 | 
						|
			if test.isOk && !ok {
 | 
						|
				t.Errorf("expected ok, got none.  %v %s", test.pod, test.nodeInfo)
 | 
						|
			}
 | 
						|
			if !test.isOk && ok {
 | 
						|
				t.Errorf("expected no ok, got one.  %v %s", test.pod, test.nodeInfo)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestRBDDiskConflicts(t *testing.T) {
 | 
						|
	volState := v1.PodSpec{
 | 
						|
		Volumes: []v1.Volume{
 | 
						|
			{
 | 
						|
				VolumeSource: v1.VolumeSource{
 | 
						|
					RBD: &v1.RBDVolumeSource{
 | 
						|
						CephMonitors: []string{"a", "b"},
 | 
						|
						RBDPool:      "foo",
 | 
						|
						RBDImage:     "bar",
 | 
						|
						FSType:       "ext4",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	volState2 := v1.PodSpec{
 | 
						|
		Volumes: []v1.Volume{
 | 
						|
			{
 | 
						|
				VolumeSource: v1.VolumeSource{
 | 
						|
					RBD: &v1.RBDVolumeSource{
 | 
						|
						CephMonitors: []string{"c", "d"},
 | 
						|
						RBDPool:      "foo",
 | 
						|
						RBDImage:     "bar",
 | 
						|
						FSType:       "ext4",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	tests := []struct {
 | 
						|
		pod      *v1.Pod
 | 
						|
		nodeInfo *schedulernodeinfo.NodeInfo
 | 
						|
		isOk     bool
 | 
						|
		name     string
 | 
						|
	}{
 | 
						|
		{&v1.Pod{}, schedulernodeinfo.NewNodeInfo(), true, "nothing"},
 | 
						|
		{&v1.Pod{}, schedulernodeinfo.NewNodeInfo(&v1.Pod{Spec: volState}), true, "one state"},
 | 
						|
		{&v1.Pod{Spec: volState}, schedulernodeinfo.NewNodeInfo(&v1.Pod{Spec: volState}), false, "same state"},
 | 
						|
		{&v1.Pod{Spec: volState2}, schedulernodeinfo.NewNodeInfo(&v1.Pod{Spec: volState}), true, "different state"},
 | 
						|
	}
 | 
						|
	expectedFailureReasons := []PredicateFailureReason{ErrDiskConflict}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			ok, reasons, err := NoDiskConflict(test.pod, GetPredicateMetadata(test.pod, nil), test.nodeInfo)
 | 
						|
			if err != nil {
 | 
						|
				t.Errorf("unexpected error: %v", err)
 | 
						|
			}
 | 
						|
			if !ok && !reflect.DeepEqual(reasons, expectedFailureReasons) {
 | 
						|
				t.Errorf("unexpected failure reasons: %v, want: %v", reasons, expectedFailureReasons)
 | 
						|
			}
 | 
						|
			if test.isOk && !ok {
 | 
						|
				t.Errorf("expected ok, got none.  %v %s", test.pod, test.nodeInfo)
 | 
						|
			}
 | 
						|
			if !test.isOk && ok {
 | 
						|
				t.Errorf("expected no ok, got one.  %v %s", test.pod, test.nodeInfo)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestISCSIDiskConflicts(t *testing.T) {
 | 
						|
	volState := v1.PodSpec{
 | 
						|
		Volumes: []v1.Volume{
 | 
						|
			{
 | 
						|
				VolumeSource: v1.VolumeSource{
 | 
						|
					ISCSI: &v1.ISCSIVolumeSource{
 | 
						|
						TargetPortal: "127.0.0.1:3260",
 | 
						|
						IQN:          "iqn.2016-12.server:storage.target01",
 | 
						|
						FSType:       "ext4",
 | 
						|
						Lun:          0,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	volState2 := v1.PodSpec{
 | 
						|
		Volumes: []v1.Volume{
 | 
						|
			{
 | 
						|
				VolumeSource: v1.VolumeSource{
 | 
						|
					ISCSI: &v1.ISCSIVolumeSource{
 | 
						|
						TargetPortal: "127.0.0.1:3260",
 | 
						|
						IQN:          "iqn.2017-12.server:storage.target01",
 | 
						|
						FSType:       "ext4",
 | 
						|
						Lun:          0,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	tests := []struct {
 | 
						|
		pod      *v1.Pod
 | 
						|
		nodeInfo *schedulernodeinfo.NodeInfo
 | 
						|
		isOk     bool
 | 
						|
		name     string
 | 
						|
	}{
 | 
						|
		{&v1.Pod{}, schedulernodeinfo.NewNodeInfo(), true, "nothing"},
 | 
						|
		{&v1.Pod{}, schedulernodeinfo.NewNodeInfo(&v1.Pod{Spec: volState}), true, "one state"},
 | 
						|
		{&v1.Pod{Spec: volState}, schedulernodeinfo.NewNodeInfo(&v1.Pod{Spec: volState}), false, "same state"},
 | 
						|
		{&v1.Pod{Spec: volState2}, schedulernodeinfo.NewNodeInfo(&v1.Pod{Spec: volState}), true, "different state"},
 | 
						|
	}
 | 
						|
	expectedFailureReasons := []PredicateFailureReason{ErrDiskConflict}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			ok, reasons, err := NoDiskConflict(test.pod, GetPredicateMetadata(test.pod, nil), test.nodeInfo)
 | 
						|
			if err != nil {
 | 
						|
				t.Errorf("unexpected error: %v", err)
 | 
						|
			}
 | 
						|
			if !ok && !reflect.DeepEqual(reasons, expectedFailureReasons) {
 | 
						|
				t.Errorf("unexpected failure reasons: %v, want: %v", reasons, expectedFailureReasons)
 | 
						|
			}
 | 
						|
			if test.isOk && !ok {
 | 
						|
				t.Errorf("expected ok, got none.  %v %s", test.pod, test.nodeInfo)
 | 
						|
			}
 | 
						|
			if !test.isOk && ok {
 | 
						|
				t.Errorf("expected no ok, got one.  %v %s", test.pod, test.nodeInfo)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// TODO: Add test case for RequiredDuringSchedulingRequiredDuringExecution after it's implemented.
 | 
						|
func TestPodFitsSelector(t *testing.T) {
 | 
						|
	tests := []struct {
 | 
						|
		pod      *v1.Pod
 | 
						|
		labels   map[string]string
 | 
						|
		nodeName string
 | 
						|
		fits     bool
 | 
						|
		name     string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			pod:  &v1.Pod{},
 | 
						|
			fits: true,
 | 
						|
			name: "no selector",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					NodeSelector: map[string]string{
 | 
						|
						"foo": "bar",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			fits: false,
 | 
						|
			name: "missing labels",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					NodeSelector: map[string]string{
 | 
						|
						"foo": "bar",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			labels: map[string]string{
 | 
						|
				"foo": "bar",
 | 
						|
			},
 | 
						|
			fits: true,
 | 
						|
			name: "same labels",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					NodeSelector: map[string]string{
 | 
						|
						"foo": "bar",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			labels: map[string]string{
 | 
						|
				"foo": "bar",
 | 
						|
				"baz": "blah",
 | 
						|
			},
 | 
						|
			fits: true,
 | 
						|
			name: "node labels are superset",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					NodeSelector: map[string]string{
 | 
						|
						"foo": "bar",
 | 
						|
						"baz": "blah",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			labels: map[string]string{
 | 
						|
				"foo": "bar",
 | 
						|
			},
 | 
						|
			fits: false,
 | 
						|
			name: "node labels are subset",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						NodeAffinity: &v1.NodeAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: &v1.NodeSelector{
 | 
						|
								NodeSelectorTerms: []v1.NodeSelectorTerm{
 | 
						|
									{
 | 
						|
										MatchExpressions: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: v1.NodeSelectorOpIn,
 | 
						|
												Values:   []string{"bar", "value2"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			labels: map[string]string{
 | 
						|
				"foo": "bar",
 | 
						|
			},
 | 
						|
			fits: true,
 | 
						|
			name: "Pod with matchExpressions using In operator that matches the existing node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						NodeAffinity: &v1.NodeAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: &v1.NodeSelector{
 | 
						|
								NodeSelectorTerms: []v1.NodeSelectorTerm{
 | 
						|
									{
 | 
						|
										MatchExpressions: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "kernel-version",
 | 
						|
												Operator: v1.NodeSelectorOpGt,
 | 
						|
												Values:   []string{"0204"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			labels: map[string]string{
 | 
						|
				// We use two digit to denote major version and two digit for minor version.
 | 
						|
				"kernel-version": "0206",
 | 
						|
			},
 | 
						|
			fits: true,
 | 
						|
			name: "Pod with matchExpressions using Gt operator that matches the existing node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						NodeAffinity: &v1.NodeAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: &v1.NodeSelector{
 | 
						|
								NodeSelectorTerms: []v1.NodeSelectorTerm{
 | 
						|
									{
 | 
						|
										MatchExpressions: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "mem-type",
 | 
						|
												Operator: v1.NodeSelectorOpNotIn,
 | 
						|
												Values:   []string{"DDR", "DDR2"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			labels: map[string]string{
 | 
						|
				"mem-type": "DDR3",
 | 
						|
			},
 | 
						|
			fits: true,
 | 
						|
			name: "Pod with matchExpressions using NotIn operator that matches the existing node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						NodeAffinity: &v1.NodeAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: &v1.NodeSelector{
 | 
						|
								NodeSelectorTerms: []v1.NodeSelectorTerm{
 | 
						|
									{
 | 
						|
										MatchExpressions: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "GPU",
 | 
						|
												Operator: v1.NodeSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			labels: map[string]string{
 | 
						|
				"GPU": "NVIDIA-GRID-K1",
 | 
						|
			},
 | 
						|
			fits: true,
 | 
						|
			name: "Pod with matchExpressions using Exists operator that matches the existing node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						NodeAffinity: &v1.NodeAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: &v1.NodeSelector{
 | 
						|
								NodeSelectorTerms: []v1.NodeSelectorTerm{
 | 
						|
									{
 | 
						|
										MatchExpressions: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: v1.NodeSelectorOpIn,
 | 
						|
												Values:   []string{"value1", "value2"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			labels: map[string]string{
 | 
						|
				"foo": "bar",
 | 
						|
			},
 | 
						|
			fits: false,
 | 
						|
			name: "Pod with affinity that don't match node's labels won't schedule onto the node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						NodeAffinity: &v1.NodeAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: &v1.NodeSelector{
 | 
						|
								NodeSelectorTerms: nil,
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			labels: map[string]string{
 | 
						|
				"foo": "bar",
 | 
						|
			},
 | 
						|
			fits: false,
 | 
						|
			name: "Pod with a nil []NodeSelectorTerm in affinity, can't match the node's labels and won't schedule onto the node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						NodeAffinity: &v1.NodeAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: &v1.NodeSelector{
 | 
						|
								NodeSelectorTerms: []v1.NodeSelectorTerm{},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			labels: map[string]string{
 | 
						|
				"foo": "bar",
 | 
						|
			},
 | 
						|
			fits: false,
 | 
						|
			name: "Pod with an empty []NodeSelectorTerm in affinity, can't match the node's labels and won't schedule onto the node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						NodeAffinity: &v1.NodeAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: &v1.NodeSelector{
 | 
						|
								NodeSelectorTerms: []v1.NodeSelectorTerm{
 | 
						|
									{
 | 
						|
										MatchExpressions: []v1.NodeSelectorRequirement{},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			labels: map[string]string{
 | 
						|
				"foo": "bar",
 | 
						|
			},
 | 
						|
			fits: false,
 | 
						|
			name: "Pod with empty MatchExpressions is not a valid value will match no objects and won't schedule onto the node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{},
 | 
						|
			labels: map[string]string{
 | 
						|
				"foo": "bar",
 | 
						|
			},
 | 
						|
			fits: true,
 | 
						|
			name: "Pod with no Affinity will schedule onto a node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						NodeAffinity: &v1.NodeAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: nil,
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			labels: map[string]string{
 | 
						|
				"foo": "bar",
 | 
						|
			},
 | 
						|
			fits: true,
 | 
						|
			name: "Pod with Affinity but nil NodeSelector will schedule onto a node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						NodeAffinity: &v1.NodeAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: &v1.NodeSelector{
 | 
						|
								NodeSelectorTerms: []v1.NodeSelectorTerm{
 | 
						|
									{
 | 
						|
										MatchExpressions: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "GPU",
 | 
						|
												Operator: v1.NodeSelectorOpExists,
 | 
						|
											}, {
 | 
						|
												Key:      "GPU",
 | 
						|
												Operator: v1.NodeSelectorOpNotIn,
 | 
						|
												Values:   []string{"AMD", "INTER"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			labels: map[string]string{
 | 
						|
				"GPU": "NVIDIA-GRID-K1",
 | 
						|
			},
 | 
						|
			fits: true,
 | 
						|
			name: "Pod with multiple matchExpressions ANDed that matches the existing node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						NodeAffinity: &v1.NodeAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: &v1.NodeSelector{
 | 
						|
								NodeSelectorTerms: []v1.NodeSelectorTerm{
 | 
						|
									{
 | 
						|
										MatchExpressions: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "GPU",
 | 
						|
												Operator: v1.NodeSelectorOpExists,
 | 
						|
											}, {
 | 
						|
												Key:      "GPU",
 | 
						|
												Operator: v1.NodeSelectorOpIn,
 | 
						|
												Values:   []string{"AMD", "INTER"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			labels: map[string]string{
 | 
						|
				"GPU": "NVIDIA-GRID-K1",
 | 
						|
			},
 | 
						|
			fits: false,
 | 
						|
			name: "Pod with multiple matchExpressions ANDed that doesn't match the existing node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						NodeAffinity: &v1.NodeAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: &v1.NodeSelector{
 | 
						|
								NodeSelectorTerms: []v1.NodeSelectorTerm{
 | 
						|
									{
 | 
						|
										MatchExpressions: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: v1.NodeSelectorOpIn,
 | 
						|
												Values:   []string{"bar", "value2"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									{
 | 
						|
										MatchExpressions: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "diffkey",
 | 
						|
												Operator: v1.NodeSelectorOpIn,
 | 
						|
												Values:   []string{"wrong", "value2"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			labels: map[string]string{
 | 
						|
				"foo": "bar",
 | 
						|
			},
 | 
						|
			fits: true,
 | 
						|
			name: "Pod with multiple NodeSelectorTerms ORed in affinity, matches the node's labels and will schedule onto the node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					NodeSelector: map[string]string{
 | 
						|
						"foo": "bar",
 | 
						|
					},
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						NodeAffinity: &v1.NodeAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: &v1.NodeSelector{
 | 
						|
								NodeSelectorTerms: []v1.NodeSelectorTerm{
 | 
						|
									{
 | 
						|
										MatchExpressions: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: v1.NodeSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			labels: map[string]string{
 | 
						|
				"foo": "bar",
 | 
						|
			},
 | 
						|
			fits: true,
 | 
						|
			name: "Pod with an Affinity and a PodSpec.NodeSelector(the old thing that we are deprecating) " +
 | 
						|
				"both are satisfied, will schedule onto the node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					NodeSelector: map[string]string{
 | 
						|
						"foo": "bar",
 | 
						|
					},
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						NodeAffinity: &v1.NodeAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: &v1.NodeSelector{
 | 
						|
								NodeSelectorTerms: []v1.NodeSelectorTerm{
 | 
						|
									{
 | 
						|
										MatchExpressions: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: v1.NodeSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			labels: map[string]string{
 | 
						|
				"foo": "barrrrrr",
 | 
						|
			},
 | 
						|
			fits: false,
 | 
						|
			name: "Pod with an Affinity matches node's labels but the PodSpec.NodeSelector(the old thing that we are deprecating) " +
 | 
						|
				"is not satisfied, won't schedule onto the node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						NodeAffinity: &v1.NodeAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: &v1.NodeSelector{
 | 
						|
								NodeSelectorTerms: []v1.NodeSelectorTerm{
 | 
						|
									{
 | 
						|
										MatchExpressions: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: v1.NodeSelectorOpNotIn,
 | 
						|
												Values:   []string{"invalid value: ___@#$%^"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			labels: map[string]string{
 | 
						|
				"foo": "bar",
 | 
						|
			},
 | 
						|
			fits: false,
 | 
						|
			name: "Pod with an invalid value in Affinity term won't be scheduled onto the node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						NodeAffinity: &v1.NodeAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: &v1.NodeSelector{
 | 
						|
								NodeSelectorTerms: []v1.NodeSelectorTerm{
 | 
						|
									{
 | 
						|
										MatchFields: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      schedulerapi.NodeFieldSelectorKeyNodeName,
 | 
						|
												Operator: v1.NodeSelectorOpIn,
 | 
						|
												Values:   []string{"node_1"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			nodeName: "node_1",
 | 
						|
			fits:     true,
 | 
						|
			name:     "Pod with matchFields using In operator that matches the existing node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						NodeAffinity: &v1.NodeAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: &v1.NodeSelector{
 | 
						|
								NodeSelectorTerms: []v1.NodeSelectorTerm{
 | 
						|
									{
 | 
						|
										MatchFields: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      schedulerapi.NodeFieldSelectorKeyNodeName,
 | 
						|
												Operator: v1.NodeSelectorOpIn,
 | 
						|
												Values:   []string{"node_1"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			nodeName: "node_2",
 | 
						|
			fits:     false,
 | 
						|
			name:     "Pod with matchFields using In operator that does not match the existing node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						NodeAffinity: &v1.NodeAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: &v1.NodeSelector{
 | 
						|
								NodeSelectorTerms: []v1.NodeSelectorTerm{
 | 
						|
									{
 | 
						|
										MatchFields: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      schedulerapi.NodeFieldSelectorKeyNodeName,
 | 
						|
												Operator: v1.NodeSelectorOpIn,
 | 
						|
												Values:   []string{"node_1"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									{
 | 
						|
										MatchExpressions: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: v1.NodeSelectorOpIn,
 | 
						|
												Values:   []string{"bar"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			nodeName: "node_2",
 | 
						|
			labels:   map[string]string{"foo": "bar"},
 | 
						|
			fits:     true,
 | 
						|
			name:     "Pod with two terms: matchFields does not match, but matchExpressions matches",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						NodeAffinity: &v1.NodeAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: &v1.NodeSelector{
 | 
						|
								NodeSelectorTerms: []v1.NodeSelectorTerm{
 | 
						|
									{
 | 
						|
										MatchFields: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      schedulerapi.NodeFieldSelectorKeyNodeName,
 | 
						|
												Operator: v1.NodeSelectorOpIn,
 | 
						|
												Values:   []string{"node_1"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										MatchExpressions: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: v1.NodeSelectorOpIn,
 | 
						|
												Values:   []string{"bar"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			nodeName: "node_2",
 | 
						|
			labels:   map[string]string{"foo": "bar"},
 | 
						|
			fits:     false,
 | 
						|
			name:     "Pod with one term: matchFields does not match, but matchExpressions matches",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						NodeAffinity: &v1.NodeAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: &v1.NodeSelector{
 | 
						|
								NodeSelectorTerms: []v1.NodeSelectorTerm{
 | 
						|
									{
 | 
						|
										MatchFields: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      schedulerapi.NodeFieldSelectorKeyNodeName,
 | 
						|
												Operator: v1.NodeSelectorOpIn,
 | 
						|
												Values:   []string{"node_1"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										MatchExpressions: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: v1.NodeSelectorOpIn,
 | 
						|
												Values:   []string{"bar"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			nodeName: "node_1",
 | 
						|
			labels:   map[string]string{"foo": "bar"},
 | 
						|
			fits:     true,
 | 
						|
			name:     "Pod with one term: both matchFields and matchExpressions match",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						NodeAffinity: &v1.NodeAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: &v1.NodeSelector{
 | 
						|
								NodeSelectorTerms: []v1.NodeSelectorTerm{
 | 
						|
									{
 | 
						|
										MatchFields: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      schedulerapi.NodeFieldSelectorKeyNodeName,
 | 
						|
												Operator: v1.NodeSelectorOpIn,
 | 
						|
												Values:   []string{"node_1"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									{
 | 
						|
										MatchExpressions: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: v1.NodeSelectorOpIn,
 | 
						|
												Values:   []string{"not-match-to-bar"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			nodeName: "node_2",
 | 
						|
			labels:   map[string]string{"foo": "bar"},
 | 
						|
			fits:     false,
 | 
						|
			name:     "Pod with two terms: both matchFields and matchExpressions do not match",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	expectedFailureReasons := []PredicateFailureReason{ErrNodeSelectorNotMatch}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			node := v1.Node{ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   test.nodeName,
 | 
						|
				Labels: test.labels,
 | 
						|
			}}
 | 
						|
			nodeInfo := schedulernodeinfo.NewNodeInfo()
 | 
						|
			nodeInfo.SetNode(&node)
 | 
						|
 | 
						|
			fits, reasons, err := PodMatchNodeSelector(test.pod, GetPredicateMetadata(test.pod, nil), nodeInfo)
 | 
						|
			if err != nil {
 | 
						|
				t.Errorf("unexpected error: %v", err)
 | 
						|
			}
 | 
						|
			if !fits && !reflect.DeepEqual(reasons, expectedFailureReasons) {
 | 
						|
				t.Errorf("unexpected failure reasons: %v, want: %v", reasons, expectedFailureReasons)
 | 
						|
			}
 | 
						|
			if fits != test.fits {
 | 
						|
				t.Errorf("expected: %v got %v", test.fits, fits)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestNodeLabelPresence(t *testing.T) {
 | 
						|
	label := map[string]string{"foo": "bar", "bar": "foo"}
 | 
						|
	tests := []struct {
 | 
						|
		pod      *v1.Pod
 | 
						|
		labels   []string
 | 
						|
		presence bool
 | 
						|
		fits     bool
 | 
						|
		name     string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			labels:   []string{"baz"},
 | 
						|
			presence: true,
 | 
						|
			fits:     false,
 | 
						|
			name:     "label does not match, presence true",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			labels:   []string{"baz"},
 | 
						|
			presence: false,
 | 
						|
			fits:     true,
 | 
						|
			name:     "label does not match, presence false",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			labels:   []string{"foo", "baz"},
 | 
						|
			presence: true,
 | 
						|
			fits:     false,
 | 
						|
			name:     "one label matches, presence true",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			labels:   []string{"foo", "baz"},
 | 
						|
			presence: false,
 | 
						|
			fits:     false,
 | 
						|
			name:     "one label matches, presence false",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			labels:   []string{"foo", "bar"},
 | 
						|
			presence: true,
 | 
						|
			fits:     true,
 | 
						|
			name:     "all labels match, presence true",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			labels:   []string{"foo", "bar"},
 | 
						|
			presence: false,
 | 
						|
			fits:     false,
 | 
						|
			name:     "all labels match, presence false",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	expectedFailureReasons := []PredicateFailureReason{ErrNodeLabelPresenceViolated}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			node := v1.Node{ObjectMeta: metav1.ObjectMeta{Labels: label}}
 | 
						|
			nodeInfo := schedulernodeinfo.NewNodeInfo()
 | 
						|
			nodeInfo.SetNode(&node)
 | 
						|
 | 
						|
			labelChecker := NodeLabelChecker{test.labels, test.presence}
 | 
						|
			fits, reasons, err := labelChecker.CheckNodeLabelPresence(test.pod, GetPredicateMetadata(test.pod, nil), nodeInfo)
 | 
						|
			if err != nil {
 | 
						|
				t.Errorf("unexpected error: %v", err)
 | 
						|
			}
 | 
						|
			if !fits && !reflect.DeepEqual(reasons, expectedFailureReasons) {
 | 
						|
				t.Errorf("unexpected failure reasons: %v, want: %v", reasons, expectedFailureReasons)
 | 
						|
			}
 | 
						|
			if fits != test.fits {
 | 
						|
				t.Errorf("expected: %v got %v", test.fits, fits)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestServiceAffinity(t *testing.T) {
 | 
						|
	selector := map[string]string{"foo": "bar"}
 | 
						|
	labels1 := map[string]string{
 | 
						|
		"region": "r1",
 | 
						|
		"zone":   "z11",
 | 
						|
	}
 | 
						|
	labels2 := map[string]string{
 | 
						|
		"region": "r1",
 | 
						|
		"zone":   "z12",
 | 
						|
	}
 | 
						|
	labels3 := map[string]string{
 | 
						|
		"region": "r2",
 | 
						|
		"zone":   "z21",
 | 
						|
	}
 | 
						|
	labels4 := map[string]string{
 | 
						|
		"region": "r2",
 | 
						|
		"zone":   "z22",
 | 
						|
	}
 | 
						|
	node1 := v1.Node{ObjectMeta: metav1.ObjectMeta{Name: "machine1", Labels: labels1}}
 | 
						|
	node2 := v1.Node{ObjectMeta: metav1.ObjectMeta{Name: "machine2", Labels: labels2}}
 | 
						|
	node3 := v1.Node{ObjectMeta: metav1.ObjectMeta{Name: "machine3", Labels: labels3}}
 | 
						|
	node4 := v1.Node{ObjectMeta: metav1.ObjectMeta{Name: "machine4", Labels: labels4}}
 | 
						|
	node5 := v1.Node{ObjectMeta: metav1.ObjectMeta{Name: "machine5", Labels: labels4}}
 | 
						|
	tests := []struct {
 | 
						|
		pod      *v1.Pod
 | 
						|
		pods     []*v1.Pod
 | 
						|
		services []*v1.Service
 | 
						|
		node     *v1.Node
 | 
						|
		labels   []string
 | 
						|
		fits     bool
 | 
						|
		name     string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			pod:    new(v1.Pod),
 | 
						|
			node:   &node1,
 | 
						|
			fits:   true,
 | 
						|
			labels: []string{"region"},
 | 
						|
			name:   "nothing scheduled",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod:    &v1.Pod{Spec: v1.PodSpec{NodeSelector: map[string]string{"region": "r1"}}},
 | 
						|
			node:   &node1,
 | 
						|
			fits:   true,
 | 
						|
			labels: []string{"region"},
 | 
						|
			name:   "pod with region label match",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod:    &v1.Pod{Spec: v1.PodSpec{NodeSelector: map[string]string{"region": "r2"}}},
 | 
						|
			node:   &node1,
 | 
						|
			fits:   false,
 | 
						|
			labels: []string{"region"},
 | 
						|
			name:   "pod with region label mismatch",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod:      &v1.Pod{ObjectMeta: metav1.ObjectMeta{Labels: selector}},
 | 
						|
			pods:     []*v1.Pod{{Spec: v1.PodSpec{NodeName: "machine1"}, ObjectMeta: metav1.ObjectMeta{Labels: selector}}},
 | 
						|
			node:     &node1,
 | 
						|
			services: []*v1.Service{{Spec: v1.ServiceSpec{Selector: selector}}},
 | 
						|
			fits:     true,
 | 
						|
			labels:   []string{"region"},
 | 
						|
			name:     "service pod on same node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod:      &v1.Pod{ObjectMeta: metav1.ObjectMeta{Labels: selector}},
 | 
						|
			pods:     []*v1.Pod{{Spec: v1.PodSpec{NodeName: "machine2"}, ObjectMeta: metav1.ObjectMeta{Labels: selector}}},
 | 
						|
			node:     &node1,
 | 
						|
			services: []*v1.Service{{Spec: v1.ServiceSpec{Selector: selector}}},
 | 
						|
			fits:     true,
 | 
						|
			labels:   []string{"region"},
 | 
						|
			name:     "service pod on different node, region match",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod:      &v1.Pod{ObjectMeta: metav1.ObjectMeta{Labels: selector}},
 | 
						|
			pods:     []*v1.Pod{{Spec: v1.PodSpec{NodeName: "machine3"}, ObjectMeta: metav1.ObjectMeta{Labels: selector}}},
 | 
						|
			node:     &node1,
 | 
						|
			services: []*v1.Service{{Spec: v1.ServiceSpec{Selector: selector}}},
 | 
						|
			fits:     false,
 | 
						|
			labels:   []string{"region"},
 | 
						|
			name:     "service pod on different node, region mismatch",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod:      &v1.Pod{ObjectMeta: metav1.ObjectMeta{Labels: selector, Namespace: "ns1"}},
 | 
						|
			pods:     []*v1.Pod{{Spec: v1.PodSpec{NodeName: "machine3"}, ObjectMeta: metav1.ObjectMeta{Labels: selector, Namespace: "ns1"}}},
 | 
						|
			node:     &node1,
 | 
						|
			services: []*v1.Service{{Spec: v1.ServiceSpec{Selector: selector}, ObjectMeta: metav1.ObjectMeta{Namespace: "ns2"}}},
 | 
						|
			fits:     true,
 | 
						|
			labels:   []string{"region"},
 | 
						|
			name:     "service in different namespace, region mismatch",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod:      &v1.Pod{ObjectMeta: metav1.ObjectMeta{Labels: selector, Namespace: "ns1"}},
 | 
						|
			pods:     []*v1.Pod{{Spec: v1.PodSpec{NodeName: "machine3"}, ObjectMeta: metav1.ObjectMeta{Labels: selector, Namespace: "ns2"}}},
 | 
						|
			node:     &node1,
 | 
						|
			services: []*v1.Service{{Spec: v1.ServiceSpec{Selector: selector}, ObjectMeta: metav1.ObjectMeta{Namespace: "ns1"}}},
 | 
						|
			fits:     true,
 | 
						|
			labels:   []string{"region"},
 | 
						|
			name:     "pod in different namespace, region mismatch",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod:      &v1.Pod{ObjectMeta: metav1.ObjectMeta{Labels: selector, Namespace: "ns1"}},
 | 
						|
			pods:     []*v1.Pod{{Spec: v1.PodSpec{NodeName: "machine3"}, ObjectMeta: metav1.ObjectMeta{Labels: selector, Namespace: "ns1"}}},
 | 
						|
			node:     &node1,
 | 
						|
			services: []*v1.Service{{Spec: v1.ServiceSpec{Selector: selector}, ObjectMeta: metav1.ObjectMeta{Namespace: "ns1"}}},
 | 
						|
			fits:     false,
 | 
						|
			labels:   []string{"region"},
 | 
						|
			name:     "service and pod in same namespace, region mismatch",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod:      &v1.Pod{ObjectMeta: metav1.ObjectMeta{Labels: selector}},
 | 
						|
			pods:     []*v1.Pod{{Spec: v1.PodSpec{NodeName: "machine2"}, ObjectMeta: metav1.ObjectMeta{Labels: selector}}},
 | 
						|
			node:     &node1,
 | 
						|
			services: []*v1.Service{{Spec: v1.ServiceSpec{Selector: selector}}},
 | 
						|
			fits:     false,
 | 
						|
			labels:   []string{"region", "zone"},
 | 
						|
			name:     "service pod on different node, multiple labels, not all match",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod:      &v1.Pod{ObjectMeta: metav1.ObjectMeta{Labels: selector}},
 | 
						|
			pods:     []*v1.Pod{{Spec: v1.PodSpec{NodeName: "machine5"}, ObjectMeta: metav1.ObjectMeta{Labels: selector}}},
 | 
						|
			node:     &node4,
 | 
						|
			services: []*v1.Service{{Spec: v1.ServiceSpec{Selector: selector}}},
 | 
						|
			fits:     true,
 | 
						|
			labels:   []string{"region", "zone"},
 | 
						|
			name:     "service pod on different node, multiple labels, all match",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	expectedFailureReasons := []PredicateFailureReason{ErrServiceAffinityViolated}
 | 
						|
	for _, test := range tests {
 | 
						|
		testIt := func(skipPrecompute bool) {
 | 
						|
			t.Run(fmt.Sprintf("%v/skipPrecompute/%v", test.name, skipPrecompute), func(t *testing.T) {
 | 
						|
				nodes := []v1.Node{node1, node2, node3, node4, node5}
 | 
						|
				nodeInfo := schedulernodeinfo.NewNodeInfo()
 | 
						|
				nodeInfo.SetNode(test.node)
 | 
						|
				nodeInfoMap := map[string]*schedulernodeinfo.NodeInfo{test.node.Name: nodeInfo}
 | 
						|
				// Reimplementing the logic that the scheduler implements: Any time it makes a predicate, it registers any precomputations.
 | 
						|
				predicate, precompute := NewServiceAffinityPredicate(schedulertesting.FakePodLister(test.pods), schedulertesting.FakeServiceLister(test.services), FakeNodeListInfo(nodes), test.labels)
 | 
						|
				// Register a precomputation or Rewrite the precomputation to a no-op, depending on the state we want to test.
 | 
						|
				RegisterPredicateMetadataProducer("ServiceAffinityMetaProducer", func(pm *predicateMetadata) {
 | 
						|
					if !skipPrecompute {
 | 
						|
						precompute(pm)
 | 
						|
					}
 | 
						|
				})
 | 
						|
				if pmeta, ok := (GetPredicateMetadata(test.pod, nodeInfoMap)).(*predicateMetadata); ok {
 | 
						|
					fits, reasons, err := predicate(test.pod, pmeta, nodeInfo)
 | 
						|
					if err != nil {
 | 
						|
						t.Errorf("unexpected error: %v", err)
 | 
						|
					}
 | 
						|
					if !fits && !reflect.DeepEqual(reasons, expectedFailureReasons) {
 | 
						|
						t.Errorf("unexpected failure reasons: %v, want: %v", reasons, expectedFailureReasons)
 | 
						|
					}
 | 
						|
					if fits != test.fits {
 | 
						|
						t.Errorf("expected: %v got %v", test.fits, fits)
 | 
						|
					}
 | 
						|
				} else {
 | 
						|
					t.Errorf("Error casting.")
 | 
						|
				}
 | 
						|
			})
 | 
						|
		}
 | 
						|
 | 
						|
		testIt(false) // Confirm that the predicate works without precomputed data (resilience)
 | 
						|
		testIt(true)  // Confirm that the predicate works with the precomputed data (better performance)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func newPodWithPort(hostPorts ...int) *v1.Pod {
 | 
						|
	networkPorts := []v1.ContainerPort{}
 | 
						|
	for _, port := range hostPorts {
 | 
						|
		networkPorts = append(networkPorts, v1.ContainerPort{HostPort: int32(port)})
 | 
						|
	}
 | 
						|
	return &v1.Pod{
 | 
						|
		Spec: v1.PodSpec{
 | 
						|
			Containers: []v1.Container{
 | 
						|
				{
 | 
						|
					Ports: networkPorts,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestRunGeneralPredicates(t *testing.T) {
 | 
						|
	resourceTests := []struct {
 | 
						|
		pod      *v1.Pod
 | 
						|
		nodeInfo *schedulernodeinfo.NodeInfo
 | 
						|
		node     *v1.Node
 | 
						|
		fits     bool
 | 
						|
		name     string
 | 
						|
		wErr     error
 | 
						|
		reasons  []PredicateFailureReason
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{},
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 9, Memory: 19})),
 | 
						|
			node: &v1.Node{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "machine1"},
 | 
						|
				Status:     v1.NodeStatus{Capacity: makeResources(10, 20, 32, 0, 0, 0).Capacity, Allocatable: makeAllocatableResources(10, 20, 32, 0, 0, 0)},
 | 
						|
			},
 | 
						|
			fits: true,
 | 
						|
			wErr: nil,
 | 
						|
			name: "no resources/port/host requested always fits",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: newResourcePod(schedulernodeinfo.Resource{MilliCPU: 8, Memory: 10}),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(
 | 
						|
				newResourcePod(schedulernodeinfo.Resource{MilliCPU: 5, Memory: 19})),
 | 
						|
			node: &v1.Node{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "machine1"},
 | 
						|
				Status:     v1.NodeStatus{Capacity: makeResources(10, 20, 32, 0, 0, 0).Capacity, Allocatable: makeAllocatableResources(10, 20, 32, 0, 0, 0)},
 | 
						|
			},
 | 
						|
			fits: false,
 | 
						|
			wErr: nil,
 | 
						|
			reasons: []PredicateFailureReason{
 | 
						|
				NewInsufficientResourceError(v1.ResourceCPU, 8, 5, 10),
 | 
						|
				NewInsufficientResourceError(v1.ResourceMemory, 10, 19, 20),
 | 
						|
			},
 | 
						|
			name: "not enough cpu and memory resource",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					NodeName: "machine2",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(),
 | 
						|
			node: &v1.Node{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "machine1"},
 | 
						|
				Status:     v1.NodeStatus{Capacity: makeResources(10, 20, 32, 0, 0, 0).Capacity, Allocatable: makeAllocatableResources(10, 20, 32, 0, 0, 0)},
 | 
						|
			},
 | 
						|
			fits:    false,
 | 
						|
			wErr:    nil,
 | 
						|
			reasons: []PredicateFailureReason{ErrPodNotMatchHostName},
 | 
						|
			name:    "host not match",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod:      newPodWithPort(123),
 | 
						|
			nodeInfo: schedulernodeinfo.NewNodeInfo(newPodWithPort(123)),
 | 
						|
			node: &v1.Node{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "machine1"},
 | 
						|
				Status:     v1.NodeStatus{Capacity: makeResources(10, 20, 32, 0, 0, 0).Capacity, Allocatable: makeAllocatableResources(10, 20, 32, 0, 0, 0)},
 | 
						|
			},
 | 
						|
			fits:    false,
 | 
						|
			wErr:    nil,
 | 
						|
			reasons: []PredicateFailureReason{ErrPodNotFitsHostPorts},
 | 
						|
			name:    "hostport conflict",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for _, test := range resourceTests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			test.nodeInfo.SetNode(test.node)
 | 
						|
			fits, reasons, err := GeneralPredicates(test.pod, GetPredicateMetadata(test.pod, nil), test.nodeInfo)
 | 
						|
			if err != nil {
 | 
						|
				t.Errorf("unexpected error: %v", err)
 | 
						|
			}
 | 
						|
			if !fits && !reflect.DeepEqual(reasons, test.reasons) {
 | 
						|
				t.Errorf("unexpected failure reasons: %v, want: %v", reasons, test.reasons)
 | 
						|
			}
 | 
						|
			if fits != test.fits {
 | 
						|
				t.Errorf("expected: %v got %v", test.fits, fits)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// TODO: Add test case for RequiredDuringSchedulingRequiredDuringExecution after it's implemented.
 | 
						|
func TestInterPodAffinity(t *testing.T) {
 | 
						|
	podLabel := map[string]string{"service": "securityscan"}
 | 
						|
	labels1 := map[string]string{
 | 
						|
		"region": "r1",
 | 
						|
		"zone":   "z11",
 | 
						|
	}
 | 
						|
	podLabel2 := map[string]string{"security": "S1"}
 | 
						|
	node1 := v1.Node{ObjectMeta: metav1.ObjectMeta{Name: "machine1", Labels: labels1}}
 | 
						|
	tests := []struct {
 | 
						|
		pod                  *v1.Pod
 | 
						|
		pods                 []*v1.Pod
 | 
						|
		node                 *v1.Node
 | 
						|
		fits                 bool
 | 
						|
		name                 string
 | 
						|
		expectFailureReasons []PredicateFailureReason
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			pod:  new(v1.Pod),
 | 
						|
			node: &node1,
 | 
						|
			fits: true,
 | 
						|
			name: "A pod that has no required pod affinity scheduling rules can schedule onto a node with no existing pods",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Labels: podLabel2,
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAffinity: &v1.PodAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"securityscan", "value2"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{{Spec: v1.PodSpec{NodeName: "machine1"}, ObjectMeta: metav1.ObjectMeta{Labels: podLabel}}},
 | 
						|
			node: &node1,
 | 
						|
			fits: true,
 | 
						|
			name: "satisfies with requiredDuringSchedulingIgnoredDuringExecution in PodAffinity using In operator that matches the existing pod",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Labels: podLabel2,
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAffinity: &v1.PodAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpNotIn,
 | 
						|
												Values:   []string{"securityscan3", "value3"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{{Spec: v1.PodSpec{NodeName: "machine1"}, ObjectMeta: metav1.ObjectMeta{Labels: podLabel}}},
 | 
						|
			node: &node1,
 | 
						|
			fits: true,
 | 
						|
			name: "satisfies the pod with requiredDuringSchedulingIgnoredDuringExecution in PodAffinity using not in operator in labelSelector that matches the existing pod",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Labels: podLabel2,
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAffinity: &v1.PodAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"securityscan", "value2"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									Namespaces: []string{"DiffNameSpace"},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods:                 []*v1.Pod{{Spec: v1.PodSpec{NodeName: "machine1"}, ObjectMeta: metav1.ObjectMeta{Labels: podLabel, Namespace: "ns"}}},
 | 
						|
			node:                 &node1,
 | 
						|
			fits:                 false,
 | 
						|
			name:                 "Does not satisfy the PodAffinity with labelSelector because of diff Namespace",
 | 
						|
			expectFailureReasons: []PredicateFailureReason{ErrPodAffinityNotMatch, ErrPodAffinityRulesNotMatch},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Labels: podLabel,
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAffinity: &v1.PodAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"antivirusscan", "value2"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods:                 []*v1.Pod{{Spec: v1.PodSpec{NodeName: "machine1"}, ObjectMeta: metav1.ObjectMeta{Labels: podLabel}}},
 | 
						|
			node:                 &node1,
 | 
						|
			fits:                 false,
 | 
						|
			name:                 "Doesn't satisfy the PodAffinity because of unmatching labelSelector with the existing pod",
 | 
						|
			expectFailureReasons: []PredicateFailureReason{ErrPodAffinityNotMatch, ErrPodAffinityRulesNotMatch},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Labels: podLabel2,
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAffinity: &v1.PodAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											}, {
 | 
						|
												Key:      "wrongkey",
 | 
						|
												Operator: metav1.LabelSelectorOpDoesNotExist,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								}, {
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"securityscan"},
 | 
						|
											}, {
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpNotIn,
 | 
						|
												Values:   []string{"WrongValue"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{{Spec: v1.PodSpec{NodeName: "machine1"}, ObjectMeta: metav1.ObjectMeta{Labels: podLabel}}},
 | 
						|
			node: &node1,
 | 
						|
			fits: true,
 | 
						|
			name: "satisfies the PodAffinity with different label Operators in multiple RequiredDuringSchedulingIgnoredDuringExecution ",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Labels: podLabel2,
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAffinity: &v1.PodAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											}, {
 | 
						|
												Key:      "wrongkey",
 | 
						|
												Operator: metav1.LabelSelectorOpDoesNotExist,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								}, {
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"securityscan2"},
 | 
						|
											}, {
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpNotIn,
 | 
						|
												Values:   []string{"WrongValue"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods:                 []*v1.Pod{{Spec: v1.PodSpec{NodeName: "machine1"}, ObjectMeta: metav1.ObjectMeta{Labels: podLabel}}},
 | 
						|
			node:                 &node1,
 | 
						|
			fits:                 false,
 | 
						|
			name:                 "The labelSelector requirements(items of matchExpressions) are ANDed, the pod cannot schedule onto the node because one of the matchExpression item don't match.",
 | 
						|
			expectFailureReasons: []PredicateFailureReason{ErrPodAffinityNotMatch, ErrPodAffinityRulesNotMatch},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Labels: podLabel2,
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAffinity: &v1.PodAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"securityscan", "value2"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
						PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"antivirusscan", "value2"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "node",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{{Spec: v1.PodSpec{NodeName: "machine1"}, ObjectMeta: metav1.ObjectMeta{Labels: podLabel}}},
 | 
						|
			node: &node1,
 | 
						|
			fits: true,
 | 
						|
			name: "satisfies the PodAffinity and PodAntiAffinity with the existing pod",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Labels: podLabel2,
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAffinity: &v1.PodAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"securityscan", "value2"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
						PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"antivirusscan", "value2"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "node",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "machine1",
 | 
						|
						Affinity: &v1.Affinity{
 | 
						|
							PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
								RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "service",
 | 
						|
													Operator: metav1.LabelSelectorOpIn,
 | 
						|
													Values:   []string{"antivirusscan", "value2"},
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "node",
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
					ObjectMeta: metav1.ObjectMeta{Labels: podLabel},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			node: &node1,
 | 
						|
			fits: true,
 | 
						|
			name: "satisfies the PodAffinity and PodAntiAffinity and PodAntiAffinity symmetry with the existing pod",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Labels: podLabel2,
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAffinity: &v1.PodAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"securityscan", "value2"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
						PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"securityscan", "value2"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "zone",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods:                 []*v1.Pod{{Spec: v1.PodSpec{NodeName: "machine1"}, ObjectMeta: metav1.ObjectMeta{Labels: podLabel}}},
 | 
						|
			node:                 &node1,
 | 
						|
			fits:                 false,
 | 
						|
			name:                 "satisfies the PodAffinity but doesn't satisfy the PodAntiAffinity with the existing pod",
 | 
						|
			expectFailureReasons: []PredicateFailureReason{ErrPodAffinityNotMatch, ErrPodAntiAffinityRulesNotMatch},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Labels: podLabel,
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAffinity: &v1.PodAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"securityscan", "value2"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
						PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"antivirusscan", "value2"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "node",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "machine1",
 | 
						|
						Affinity: &v1.Affinity{
 | 
						|
							PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
								RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "service",
 | 
						|
													Operator: metav1.LabelSelectorOpIn,
 | 
						|
													Values:   []string{"securityscan", "value2"},
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "zone",
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
					ObjectMeta: metav1.ObjectMeta{Labels: podLabel},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			node:                 &node1,
 | 
						|
			fits:                 false,
 | 
						|
			name:                 "satisfies the PodAffinity and PodAntiAffinity but doesn't satisfy PodAntiAffinity symmetry with the existing pod",
 | 
						|
			expectFailureReasons: []PredicateFailureReason{ErrPodAffinityNotMatch, ErrExistingPodsAntiAffinityRulesNotMatch},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Labels: podLabel,
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAffinity: &v1.PodAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpNotIn,
 | 
						|
												Values:   []string{"securityscan", "value2"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods:                 []*v1.Pod{{Spec: v1.PodSpec{NodeName: "machine2"}, ObjectMeta: metav1.ObjectMeta{Labels: podLabel}}},
 | 
						|
			node:                 &node1,
 | 
						|
			fits:                 false,
 | 
						|
			name:                 "pod matches its own Label in PodAffinity and that matches the existing pod Labels",
 | 
						|
			expectFailureReasons: []PredicateFailureReason{ErrPodAffinityNotMatch, ErrPodAffinityRulesNotMatch},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Labels: podLabel,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{
 | 
						|
					Spec: v1.PodSpec{NodeName: "machine1",
 | 
						|
						Affinity: &v1.Affinity{
 | 
						|
							PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
								RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "service",
 | 
						|
													Operator: metav1.LabelSelectorOpIn,
 | 
						|
													Values:   []string{"securityscan", "value2"},
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "zone",
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
					ObjectMeta: metav1.ObjectMeta{Labels: podLabel},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			node:                 &node1,
 | 
						|
			fits:                 false,
 | 
						|
			name:                 "verify that PodAntiAffinity from existing pod is respected when pod has no AntiAffinity constraints. doesn't satisfy PodAntiAffinity symmetry with the existing pod",
 | 
						|
			expectFailureReasons: []PredicateFailureReason{ErrPodAffinityNotMatch, ErrExistingPodsAntiAffinityRulesNotMatch},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Labels: podLabel,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{
 | 
						|
					Spec: v1.PodSpec{NodeName: "machine1",
 | 
						|
						Affinity: &v1.Affinity{
 | 
						|
							PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
								RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "service",
 | 
						|
													Operator: metav1.LabelSelectorOpNotIn,
 | 
						|
													Values:   []string{"securityscan", "value2"},
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "zone",
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
					ObjectMeta: metav1.ObjectMeta{Labels: podLabel},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			node: &node1,
 | 
						|
			fits: true,
 | 
						|
			name: "verify that PodAntiAffinity from existing pod is respected when pod has no AntiAffinity constraints. satisfy PodAntiAffinity symmetry with the existing pod",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Labels: podLabel,
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "security",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{
 | 
						|
					ObjectMeta: metav1.ObjectMeta{Labels: podLabel2},
 | 
						|
					Spec: v1.PodSpec{NodeName: "machine1",
 | 
						|
						Affinity: &v1.Affinity{
 | 
						|
							PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
								RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "security",
 | 
						|
													Operator: metav1.LabelSelectorOpExists,
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "zone",
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			node:                 &node1,
 | 
						|
			fits:                 false,
 | 
						|
			name:                 "satisfies the PodAntiAffinity with existing pod but doesn't satisfy PodAntiAffinity symmetry with incoming pod",
 | 
						|
			expectFailureReasons: []PredicateFailureReason{ErrPodAffinityNotMatch, ErrPodAntiAffinityRulesNotMatch},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Labels: podLabel},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "zone",
 | 
						|
								},
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "security",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "zone",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{
 | 
						|
					ObjectMeta: metav1.ObjectMeta{Labels: podLabel2},
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "machine1",
 | 
						|
						Affinity: &v1.Affinity{
 | 
						|
							PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
								RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "security",
 | 
						|
													Operator: metav1.LabelSelectorOpExists,
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "zone",
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			node:                 &node1,
 | 
						|
			fits:                 false,
 | 
						|
			expectFailureReasons: []PredicateFailureReason{ErrPodAffinityNotMatch, ErrPodAntiAffinityRulesNotMatch},
 | 
						|
			name:                 "PodAntiAffinity symmetry check a1: incoming pod and existing pod partially match each other on AffinityTerms",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Labels: podLabel2},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "security",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "zone",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{
 | 
						|
					ObjectMeta: metav1.ObjectMeta{Labels: podLabel},
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "machine1",
 | 
						|
						Affinity: &v1.Affinity{
 | 
						|
							PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
								RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "service",
 | 
						|
													Operator: metav1.LabelSelectorOpExists,
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "zone",
 | 
						|
									},
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "security",
 | 
						|
													Operator: metav1.LabelSelectorOpExists,
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "zone",
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			node:                 &node1,
 | 
						|
			fits:                 false,
 | 
						|
			expectFailureReasons: []PredicateFailureReason{ErrPodAffinityNotMatch, ErrExistingPodsAntiAffinityRulesNotMatch},
 | 
						|
			name:                 "PodAntiAffinity symmetry check a2: incoming pod and existing pod partially match each other on AffinityTerms",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Labels: map[string]string{"abc": "", "xyz": ""}},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "abc",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "zone",
 | 
						|
								},
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "def",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "zone",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{
 | 
						|
					ObjectMeta: metav1.ObjectMeta{Labels: map[string]string{"def": "", "xyz": ""}},
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "machine1",
 | 
						|
						Affinity: &v1.Affinity{
 | 
						|
							PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
								RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "abc",
 | 
						|
													Operator: metav1.LabelSelectorOpExists,
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "zone",
 | 
						|
									},
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "def",
 | 
						|
													Operator: metav1.LabelSelectorOpExists,
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "zone",
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			node:                 &node1,
 | 
						|
			fits:                 false,
 | 
						|
			expectFailureReasons: []PredicateFailureReason{ErrPodAffinityNotMatch, ErrExistingPodsAntiAffinityRulesNotMatch},
 | 
						|
			name:                 "PodAntiAffinity symmetry check b1: incoming pod and existing pod partially match each other on AffinityTerms",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Labels: map[string]string{"def": "", "xyz": ""}},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "abc",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "zone",
 | 
						|
								},
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "def",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "zone",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{
 | 
						|
					ObjectMeta: metav1.ObjectMeta{Labels: map[string]string{"abc": "", "xyz": ""}},
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "machine1",
 | 
						|
						Affinity: &v1.Affinity{
 | 
						|
							PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
								RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "abc",
 | 
						|
													Operator: metav1.LabelSelectorOpExists,
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "zone",
 | 
						|
									},
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "def",
 | 
						|
													Operator: metav1.LabelSelectorOpExists,
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "zone",
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			node:                 &node1,
 | 
						|
			fits:                 false,
 | 
						|
			expectFailureReasons: []PredicateFailureReason{ErrPodAffinityNotMatch, ErrExistingPodsAntiAffinityRulesNotMatch},
 | 
						|
			name:                 "PodAntiAffinity symmetry check b2: incoming pod and existing pod partially match each other on AffinityTerms",
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			node := test.node
 | 
						|
			var podsOnNode []*v1.Pod
 | 
						|
			for _, pod := range test.pods {
 | 
						|
				if pod.Spec.NodeName == node.Name {
 | 
						|
					podsOnNode = append(podsOnNode, pod)
 | 
						|
				}
 | 
						|
			}
 | 
						|
 | 
						|
			fit := PodAffinityChecker{
 | 
						|
				info:      FakeNodeInfo(*node),
 | 
						|
				podLister: schedulertesting.FakePodLister(test.pods),
 | 
						|
			}
 | 
						|
			nodeInfo := schedulernodeinfo.NewNodeInfo(podsOnNode...)
 | 
						|
			nodeInfo.SetNode(test.node)
 | 
						|
			nodeInfoMap := map[string]*schedulernodeinfo.NodeInfo{test.node.Name: nodeInfo}
 | 
						|
			fits, reasons, _ := fit.InterPodAffinityMatches(test.pod, GetPredicateMetadata(test.pod, nodeInfoMap), nodeInfo)
 | 
						|
			if !fits && !reflect.DeepEqual(reasons, test.expectFailureReasons) {
 | 
						|
				t.Errorf("unexpected failure reasons: %v, want: %v", reasons, test.expectFailureReasons)
 | 
						|
			}
 | 
						|
			if fits != test.fits {
 | 
						|
				t.Errorf("expected %v got %v", test.fits, fits)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestInterPodAffinityWithMultipleNodes(t *testing.T) {
 | 
						|
	podLabelA := map[string]string{
 | 
						|
		"foo": "bar",
 | 
						|
	}
 | 
						|
	labelRgChina := map[string]string{
 | 
						|
		"region": "China",
 | 
						|
	}
 | 
						|
	labelRgChinaAzAz1 := map[string]string{
 | 
						|
		"region": "China",
 | 
						|
		"az":     "az1",
 | 
						|
	}
 | 
						|
	labelRgIndia := map[string]string{
 | 
						|
		"region": "India",
 | 
						|
	}
 | 
						|
	labelRgUS := map[string]string{
 | 
						|
		"region": "US",
 | 
						|
	}
 | 
						|
 | 
						|
	tests := []struct {
 | 
						|
		pod                               *v1.Pod
 | 
						|
		pods                              []*v1.Pod
 | 
						|
		nodes                             []v1.Node
 | 
						|
		nodesExpectAffinityFailureReasons [][]PredicateFailureReason
 | 
						|
		fits                              map[string]bool
 | 
						|
		name                              string
 | 
						|
		nometa                            bool
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAffinity: &v1.PodAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"bar"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{Spec: v1.PodSpec{NodeName: "machine1"}, ObjectMeta: metav1.ObjectMeta{Name: "p1", Labels: podLabelA}},
 | 
						|
			},
 | 
						|
			nodes: []v1.Node{
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "machine1", Labels: labelRgChina}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "machine2", Labels: labelRgChinaAzAz1}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "machine3", Labels: labelRgIndia}},
 | 
						|
			},
 | 
						|
			fits: map[string]bool{
 | 
						|
				"machine1": true,
 | 
						|
				"machine2": true,
 | 
						|
				"machine3": false,
 | 
						|
			},
 | 
						|
			nodesExpectAffinityFailureReasons: [][]PredicateFailureReason{nil, nil, {ErrPodAffinityNotMatch, ErrPodAffinityRulesNotMatch}},
 | 
						|
			name:                              "A pod can be scheduled onto all the nodes that have the same topology key & label value with one of them has an existing pod that matches the affinity rules",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						NodeAffinity: &v1.NodeAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: &v1.NodeSelector{
 | 
						|
								NodeSelectorTerms: []v1.NodeSelectorTerm{
 | 
						|
									{
 | 
						|
										MatchExpressions: []v1.NodeSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "hostname",
 | 
						|
												Operator: v1.NodeSelectorOpNotIn,
 | 
						|
												Values:   []string{"h1"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
						PodAffinity: &v1.PodAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"abc"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{Spec: v1.PodSpec{NodeName: "nodeA"}, ObjectMeta: metav1.ObjectMeta{Labels: map[string]string{"foo": "abc"}}},
 | 
						|
				{Spec: v1.PodSpec{NodeName: "nodeB"}, ObjectMeta: metav1.ObjectMeta{Labels: map[string]string{"foo": "def"}}},
 | 
						|
			},
 | 
						|
			nodes: []v1.Node{
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeA", Labels: map[string]string{"region": "r1", "hostname": "h1"}}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeB", Labels: map[string]string{"region": "r1", "hostname": "h2"}}},
 | 
						|
			},
 | 
						|
			nodesExpectAffinityFailureReasons: [][]PredicateFailureReason{nil, nil},
 | 
						|
			fits: map[string]bool{
 | 
						|
				"nodeA": false,
 | 
						|
				"nodeB": true,
 | 
						|
			},
 | 
						|
			name: "NodeA and nodeB have same topologyKey and label value. NodeA does not satisfy node affinity rule, but has an existing pod that matches the inter pod affinity rule. The pod can be scheduled onto nodeB.",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Labels: map[string]string{
 | 
						|
						"foo":     "bar",
 | 
						|
						"service": "securityscan",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAffinity: &v1.PodAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"bar"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "zone",
 | 
						|
								},
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"securityscan"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "zone",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{{Spec: v1.PodSpec{NodeName: "nodeA"}, ObjectMeta: metav1.ObjectMeta{Name: "p1", Labels: map[string]string{"foo": "bar"}}}},
 | 
						|
			nodes: []v1.Node{
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeA", Labels: map[string]string{"zone": "az1", "hostname": "h1"}}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeB", Labels: map[string]string{"zone": "az2", "hostname": "h2"}}},
 | 
						|
			},
 | 
						|
			nodesExpectAffinityFailureReasons: [][]PredicateFailureReason{nil, nil},
 | 
						|
			fits: map[string]bool{
 | 
						|
				"nodeA": true,
 | 
						|
				"nodeB": true,
 | 
						|
			},
 | 
						|
			name: "The affinity rule is to schedule all of the pods of this collection to the same zone. The first pod of the collection " +
 | 
						|
				"should not be blocked from being scheduled onto any node, even there's no existing pod that matches the rule anywhere.",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"abc"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{Spec: v1.PodSpec{NodeName: "nodeA"}, ObjectMeta: metav1.ObjectMeta{Labels: map[string]string{"foo": "abc"}}},
 | 
						|
			},
 | 
						|
			nodes: []v1.Node{
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeA", Labels: map[string]string{"region": "r1", "hostname": "nodeA"}}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeB", Labels: map[string]string{"region": "r1", "hostname": "nodeB"}}},
 | 
						|
			},
 | 
						|
			nodesExpectAffinityFailureReasons: [][]PredicateFailureReason{{ErrPodAffinityNotMatch, ErrPodAntiAffinityRulesNotMatch}, {ErrPodAffinityNotMatch, ErrPodAntiAffinityRulesNotMatch}},
 | 
						|
			fits: map[string]bool{
 | 
						|
				"nodeA": false,
 | 
						|
				"nodeB": false,
 | 
						|
			},
 | 
						|
			name: "NodeA and nodeB have same topologyKey and label value. NodeA has an existing pod that matches the inter pod affinity rule. The pod can not be scheduled onto nodeA and nodeB.",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"abc"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "service",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"securityscan"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "zone",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{Spec: v1.PodSpec{NodeName: "nodeA"}, ObjectMeta: metav1.ObjectMeta{Labels: map[string]string{"foo": "abc", "service": "securityscan"}}},
 | 
						|
			},
 | 
						|
			nodes: []v1.Node{
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeA", Labels: map[string]string{"region": "r1", "zone": "z1", "hostname": "nodeA"}}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeB", Labels: map[string]string{"region": "r1", "zone": "z2", "hostname": "nodeB"}}},
 | 
						|
			},
 | 
						|
			nodesExpectAffinityFailureReasons: [][]PredicateFailureReason{
 | 
						|
				{ErrPodAffinityNotMatch, ErrPodAntiAffinityRulesNotMatch},
 | 
						|
				{ErrPodAffinityNotMatch, ErrPodAntiAffinityRulesNotMatch},
 | 
						|
			},
 | 
						|
			fits: map[string]bool{
 | 
						|
				"nodeA": false,
 | 
						|
				"nodeB": false,
 | 
						|
			},
 | 
						|
			name: "This test ensures that anti-affinity matches a pod when any term of the anti-affinity rule matches a pod.",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"abc"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{Spec: v1.PodSpec{NodeName: "nodeA"}, ObjectMeta: metav1.ObjectMeta{Labels: map[string]string{"foo": "abc"}}},
 | 
						|
			},
 | 
						|
			nodes: []v1.Node{
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeA", Labels: labelRgChina}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeB", Labels: labelRgChinaAzAz1}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeC", Labels: labelRgIndia}},
 | 
						|
			},
 | 
						|
			nodesExpectAffinityFailureReasons: [][]PredicateFailureReason{{ErrPodAffinityNotMatch, ErrPodAntiAffinityRulesNotMatch}, {ErrPodAffinityNotMatch, ErrPodAntiAffinityRulesNotMatch}, nil},
 | 
						|
			fits: map[string]bool{
 | 
						|
				"nodeA": false,
 | 
						|
				"nodeB": false,
 | 
						|
				"nodeC": true,
 | 
						|
			},
 | 
						|
			name: "NodeA and nodeB have same topologyKey and label value. NodeA has an existing pod that matches the inter pod affinity rule. The pod can not be scheduled onto nodeA and nodeB but can be scheduled onto nodeC",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Labels: map[string]string{"foo": "123"}},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"bar"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{Spec: v1.PodSpec{NodeName: "nodeA"}, ObjectMeta: metav1.ObjectMeta{Labels: map[string]string{"foo": "bar"}}},
 | 
						|
				{
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "nodeC",
 | 
						|
						Affinity: &v1.Affinity{
 | 
						|
							PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
								RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "foo",
 | 
						|
													Operator: metav1.LabelSelectorOpIn,
 | 
						|
													Values:   []string{"123"},
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "region",
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			nodes: []v1.Node{
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeA", Labels: labelRgChina}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeB", Labels: labelRgChinaAzAz1}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeC", Labels: labelRgIndia}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeD", Labels: labelRgUS}},
 | 
						|
			},
 | 
						|
			nodesExpectAffinityFailureReasons: [][]PredicateFailureReason{
 | 
						|
				{ErrPodAffinityNotMatch, ErrPodAntiAffinityRulesNotMatch},
 | 
						|
				{ErrPodAffinityNotMatch, ErrPodAntiAffinityRulesNotMatch},
 | 
						|
				{ErrPodAffinityNotMatch, ErrExistingPodsAntiAffinityRulesNotMatch},
 | 
						|
				nil,
 | 
						|
			},
 | 
						|
			fits: map[string]bool{
 | 
						|
				"nodeA": false,
 | 
						|
				"nodeB": false,
 | 
						|
				"nodeC": false,
 | 
						|
				"nodeD": true,
 | 
						|
			},
 | 
						|
			name:   "NodeA and nodeB have same topologyKey and label value. NodeA has an existing pod that matches the inter pod affinity rule. NodeC has an existing pod that match the inter pod affinity rule. The pod can not be scheduled onto nodeA, nodeB and nodeC but can be schedulerd onto nodeD",
 | 
						|
			nometa: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Labels:    map[string]string{"foo": "123"},
 | 
						|
					Namespace: "NS1",
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: metav1.LabelSelectorOpIn,
 | 
						|
												Values:   []string{"bar"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{
 | 
						|
					ObjectMeta: metav1.ObjectMeta{
 | 
						|
						Labels:    map[string]string{"foo": "bar"},
 | 
						|
						Namespace: "NS1",
 | 
						|
					},
 | 
						|
					Spec: v1.PodSpec{NodeName: "nodeA"},
 | 
						|
				},
 | 
						|
				{
 | 
						|
					ObjectMeta: metav1.ObjectMeta{Namespace: "NS2"},
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "nodeC",
 | 
						|
						Affinity: &v1.Affinity{
 | 
						|
							PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
								RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "foo",
 | 
						|
													Operator: metav1.LabelSelectorOpIn,
 | 
						|
													Values:   []string{"123"},
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "region",
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			nodes: []v1.Node{
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeA", Labels: labelRgChina}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeB", Labels: labelRgChinaAzAz1}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeC", Labels: labelRgIndia}},
 | 
						|
			},
 | 
						|
			nodesExpectAffinityFailureReasons: [][]PredicateFailureReason{
 | 
						|
				{ErrPodAffinityNotMatch, ErrPodAntiAffinityRulesNotMatch},
 | 
						|
				{ErrPodAffinityNotMatch, ErrPodAntiAffinityRulesNotMatch},
 | 
						|
				nil,
 | 
						|
			},
 | 
						|
			fits: map[string]bool{
 | 
						|
				"nodeA": false,
 | 
						|
				"nodeB": false,
 | 
						|
				"nodeC": true,
 | 
						|
			},
 | 
						|
			name: "NodeA and nodeB have same topologyKey and label value. NodeA has an existing pod that matches the inter pod affinity rule. The pod can not be scheduled onto nodeA, nodeB, but can be scheduled onto nodeC (NodeC has an existing pod that match the inter pod affinity rule but in different namespace)",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Labels: map[string]string{"foo": ""}},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "nodeA",
 | 
						|
						Affinity: &v1.Affinity{
 | 
						|
							PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
								RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "foo",
 | 
						|
													Operator: metav1.LabelSelectorOpExists,
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "invalid-node-label",
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			nodes: []v1.Node{
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeA", Labels: map[string]string{"region": "r1", "zone": "z1", "hostname": "nodeA"}}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeB", Labels: map[string]string{"region": "r1", "zone": "z1", "hostname": "nodeB"}}},
 | 
						|
			},
 | 
						|
			nodesExpectAffinityFailureReasons: [][]PredicateFailureReason{},
 | 
						|
			fits: map[string]bool{
 | 
						|
				"nodeA": true,
 | 
						|
				"nodeB": true,
 | 
						|
			},
 | 
						|
			name: "Test existing pod's anti-affinity: if an existing pod has a term with invalid topologyKey, labelSelector of the term is firstly checked, and then topologyKey of the term is also checked",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "invalid-node-label",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{
 | 
						|
					ObjectMeta: metav1.ObjectMeta{Labels: map[string]string{"foo": ""}},
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "nodeA",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			nodes: []v1.Node{
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeA", Labels: map[string]string{"region": "r1", "zone": "z1", "hostname": "nodeA"}}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeB", Labels: map[string]string{"region": "r1", "zone": "z1", "hostname": "nodeB"}}},
 | 
						|
			},
 | 
						|
			nodesExpectAffinityFailureReasons: [][]PredicateFailureReason{},
 | 
						|
			fits: map[string]bool{
 | 
						|
				"nodeA": true,
 | 
						|
				"nodeB": true,
 | 
						|
			},
 | 
						|
			name: "Test incoming pod's anti-affinity: even if lableSelector matches, we still check if topologyKey matches",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Labels: map[string]string{"foo": "", "bar": ""}},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{
 | 
						|
					ObjectMeta: metav1.ObjectMeta{Name: "pod1"},
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "nodeA",
 | 
						|
						Affinity: &v1.Affinity{
 | 
						|
							PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
								RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "foo",
 | 
						|
													Operator: metav1.LabelSelectorOpExists,
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "zone",
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				{
 | 
						|
					ObjectMeta: metav1.ObjectMeta{Name: "pod2"},
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "nodeA",
 | 
						|
						Affinity: &v1.Affinity{
 | 
						|
							PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
								RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "bar",
 | 
						|
													Operator: metav1.LabelSelectorOpExists,
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "region",
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			nodes: []v1.Node{
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeA", Labels: map[string]string{"region": "r1", "zone": "z1", "hostname": "nodeA"}}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeB", Labels: map[string]string{"region": "r1", "zone": "z2", "hostname": "nodeB"}}},
 | 
						|
			},
 | 
						|
			nodesExpectAffinityFailureReasons: [][]PredicateFailureReason{
 | 
						|
				{ErrPodAffinityNotMatch, ErrExistingPodsAntiAffinityRulesNotMatch},
 | 
						|
				{ErrPodAffinityNotMatch, ErrExistingPodsAntiAffinityRulesNotMatch},
 | 
						|
			},
 | 
						|
			fits: map[string]bool{
 | 
						|
				"nodeA": false,
 | 
						|
				"nodeB": false,
 | 
						|
			},
 | 
						|
			name: "Test existing pod's anti-affinity: incoming pod wouldn't considered as a fit as it violates each existingPod's terms on all nodes",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "zone",
 | 
						|
								},
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "bar",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{
 | 
						|
					ObjectMeta: metav1.ObjectMeta{Labels: map[string]string{"foo": ""}},
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "nodeA",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				{
 | 
						|
					ObjectMeta: metav1.ObjectMeta{Labels: map[string]string{"bar": ""}},
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "nodeB",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			nodes: []v1.Node{
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeA", Labels: map[string]string{"region": "r1", "zone": "z1", "hostname": "nodeA"}}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeB", Labels: map[string]string{"region": "r1", "zone": "z2", "hostname": "nodeB"}}},
 | 
						|
			},
 | 
						|
			nodesExpectAffinityFailureReasons: [][]PredicateFailureReason{
 | 
						|
				{ErrPodAffinityNotMatch, ErrPodAntiAffinityRulesNotMatch},
 | 
						|
				{ErrPodAffinityNotMatch, ErrPodAntiAffinityRulesNotMatch},
 | 
						|
			},
 | 
						|
			fits: map[string]bool{
 | 
						|
				"nodeA": false,
 | 
						|
				"nodeB": false,
 | 
						|
			},
 | 
						|
			name: "Test incoming pod's anti-affinity: incoming pod wouldn't considered as a fit as it at least violates one anti-affinity rule of existingPod",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Labels: map[string]string{"foo": "", "bar": ""}},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "nodeA",
 | 
						|
						Affinity: &v1.Affinity{
 | 
						|
							PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
								RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "foo",
 | 
						|
													Operator: metav1.LabelSelectorOpExists,
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "invalid-node-label",
 | 
						|
									},
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "bar",
 | 
						|
													Operator: metav1.LabelSelectorOpExists,
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "zone",
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			nodes: []v1.Node{
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeA", Labels: map[string]string{"region": "r1", "zone": "z1", "hostname": "nodeA"}}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeB", Labels: map[string]string{"region": "r1", "zone": "z2", "hostname": "nodeB"}}},
 | 
						|
			},
 | 
						|
			nodesExpectAffinityFailureReasons: [][]PredicateFailureReason{
 | 
						|
				{ErrPodAffinityNotMatch, ErrExistingPodsAntiAffinityRulesNotMatch},
 | 
						|
			},
 | 
						|
			fits: map[string]bool{
 | 
						|
				"nodeA": false,
 | 
						|
				"nodeB": true,
 | 
						|
			},
 | 
						|
			name: "Test existing pod's anti-affinity: only when labelSelector and topologyKey both match, it's counted as a single term match - case when one term has invalid topologyKey",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "invalid-node-label",
 | 
						|
								},
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "bar",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "zone",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{
 | 
						|
					ObjectMeta: metav1.ObjectMeta{Name: "podA", Labels: map[string]string{"foo": "", "bar": ""}},
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "nodeA",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			nodes: []v1.Node{
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeA", Labels: map[string]string{"region": "r1", "zone": "z1", "hostname": "nodeA"}}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeB", Labels: map[string]string{"region": "r1", "zone": "z2", "hostname": "nodeB"}}},
 | 
						|
			},
 | 
						|
			nodesExpectAffinityFailureReasons: [][]PredicateFailureReason{
 | 
						|
				{ErrPodAffinityNotMatch, ErrPodAntiAffinityRulesNotMatch},
 | 
						|
			},
 | 
						|
			fits: map[string]bool{
 | 
						|
				"nodeA": false,
 | 
						|
				"nodeB": true,
 | 
						|
			},
 | 
						|
			name: "Test incoming pod's anti-affinity: only when labelSelector and topologyKey both match, it's counted as a single term match - case when one term has invalid topologyKey",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Labels: map[string]string{"foo": "", "bar": ""}},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "nodeA",
 | 
						|
						Affinity: &v1.Affinity{
 | 
						|
							PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
								RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "foo",
 | 
						|
													Operator: metav1.LabelSelectorOpExists,
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "region",
 | 
						|
									},
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "bar",
 | 
						|
													Operator: metav1.LabelSelectorOpExists,
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "zone",
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			nodes: []v1.Node{
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeA", Labels: map[string]string{"region": "r1", "zone": "z1", "hostname": "nodeA"}}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeB", Labels: map[string]string{"region": "r1", "zone": "z2", "hostname": "nodeB"}}},
 | 
						|
			},
 | 
						|
			nodesExpectAffinityFailureReasons: [][]PredicateFailureReason{
 | 
						|
				{ErrPodAffinityNotMatch, ErrExistingPodsAntiAffinityRulesNotMatch},
 | 
						|
				{ErrPodAffinityNotMatch, ErrExistingPodsAntiAffinityRulesNotMatch},
 | 
						|
			},
 | 
						|
			fits: map[string]bool{
 | 
						|
				"nodeA": false,
 | 
						|
				"nodeB": false,
 | 
						|
			},
 | 
						|
			name: "Test existing pod's anti-affinity: only when labelSelector and topologyKey both match, it's counted as a single term match - case when all terms have valid topologyKey",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "bar",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "zone",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{
 | 
						|
					ObjectMeta: metav1.ObjectMeta{Labels: map[string]string{"foo": "", "bar": ""}},
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "nodeA",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			nodes: []v1.Node{
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeA", Labels: map[string]string{"region": "r1", "zone": "z1", "hostname": "nodeA"}}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeB", Labels: map[string]string{"region": "r1", "zone": "z2", "hostname": "nodeB"}}},
 | 
						|
			},
 | 
						|
			nodesExpectAffinityFailureReasons: [][]PredicateFailureReason{
 | 
						|
				{ErrPodAffinityNotMatch, ErrPodAntiAffinityRulesNotMatch},
 | 
						|
				{ErrPodAffinityNotMatch, ErrPodAntiAffinityRulesNotMatch},
 | 
						|
			},
 | 
						|
			fits: map[string]bool{
 | 
						|
				"nodeA": false,
 | 
						|
				"nodeB": false,
 | 
						|
			},
 | 
						|
			name: "Test incoming pod's anti-affinity: only when labelSelector and topologyKey both match, it's counted as a single term match - case when all terms have valid topologyKey",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Labels: map[string]string{"foo": "", "bar": ""}},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "nodeA",
 | 
						|
						Affinity: &v1.Affinity{
 | 
						|
							PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
								RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "foo",
 | 
						|
													Operator: metav1.LabelSelectorOpExists,
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "zone",
 | 
						|
									},
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "labelA",
 | 
						|
													Operator: metav1.LabelSelectorOpExists,
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "zone",
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				{
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "nodeB",
 | 
						|
						Affinity: &v1.Affinity{
 | 
						|
							PodAntiAffinity: &v1.PodAntiAffinity{
 | 
						|
								RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "bar",
 | 
						|
													Operator: metav1.LabelSelectorOpExists,
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "zone",
 | 
						|
									},
 | 
						|
									{
 | 
						|
										LabelSelector: &metav1.LabelSelector{
 | 
						|
											MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
												{
 | 
						|
													Key:      "labelB",
 | 
						|
													Operator: metav1.LabelSelectorOpExists,
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
										TopologyKey: "zone",
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			nodes: []v1.Node{
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeA", Labels: map[string]string{"region": "r1", "zone": "z1", "hostname": "nodeA"}}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeB", Labels: map[string]string{"region": "r1", "zone": "z2", "hostname": "nodeB"}}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeC", Labels: map[string]string{"region": "r1", "zone": "z3", "hostname": "nodeC"}}},
 | 
						|
			},
 | 
						|
			nodesExpectAffinityFailureReasons: [][]PredicateFailureReason{
 | 
						|
				{ErrPodAffinityNotMatch, ErrExistingPodsAntiAffinityRulesNotMatch},
 | 
						|
				{ErrPodAffinityNotMatch, ErrExistingPodsAntiAffinityRulesNotMatch},
 | 
						|
			},
 | 
						|
			fits: map[string]bool{
 | 
						|
				"nodeA": false,
 | 
						|
				"nodeB": false,
 | 
						|
				"nodeC": true,
 | 
						|
			},
 | 
						|
			name: "Test existing pod's anti-affinity: existingPod on nodeA and nodeB has at least one anti-affinity term matches incoming pod, so incoming pod can only be scheduled to nodeC",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAffinity: &v1.PodAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "bar",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "zone",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{
 | 
						|
					ObjectMeta: metav1.ObjectMeta{Name: "pod1", Labels: map[string]string{"foo": "", "bar": ""}},
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "nodeA",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			nodes: []v1.Node{
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeA", Labels: map[string]string{"region": "r1", "zone": "z1", "hostname": "nodeA"}}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeB", Labels: map[string]string{"region": "r1", "zone": "z1", "hostname": "nodeB"}}},
 | 
						|
			},
 | 
						|
			nodesExpectAffinityFailureReasons: [][]PredicateFailureReason{
 | 
						|
				{},
 | 
						|
				{ErrPodAffinityNotMatch, ErrPodAffinityRulesNotMatch},
 | 
						|
			},
 | 
						|
			fits: map[string]bool{
 | 
						|
				"nodeA": true,
 | 
						|
				"nodeB": true,
 | 
						|
			},
 | 
						|
			name: "Test incoming pod's affinity: firstly check if all affinityTerms match, and then check if all topologyKeys match",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Affinity: &v1.Affinity{
 | 
						|
						PodAffinity: &v1.PodAffinity{
 | 
						|
							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "foo",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
								{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "bar",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									TopologyKey: "zone",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			pods: []*v1.Pod{
 | 
						|
				{
 | 
						|
					ObjectMeta: metav1.ObjectMeta{Name: "pod1", Labels: map[string]string{"foo": ""}},
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "nodeA",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				{
 | 
						|
					ObjectMeta: metav1.ObjectMeta{Name: "pod2", Labels: map[string]string{"bar": ""}},
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						NodeName: "nodeB",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			nodes: []v1.Node{
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeA", Labels: map[string]string{"region": "r1", "zone": "z1", "hostname": "nodeA"}}},
 | 
						|
				{ObjectMeta: metav1.ObjectMeta{Name: "nodeB", Labels: map[string]string{"region": "r1", "zone": "z2", "hostname": "nodeB"}}},
 | 
						|
			},
 | 
						|
			nodesExpectAffinityFailureReasons: [][]PredicateFailureReason{
 | 
						|
				{ErrPodAffinityNotMatch, ErrPodAffinityRulesNotMatch},
 | 
						|
				{ErrPodAffinityNotMatch, ErrPodAffinityRulesNotMatch},
 | 
						|
			},
 | 
						|
			fits: map[string]bool{
 | 
						|
				"nodeA": false,
 | 
						|
				"nodeB": false,
 | 
						|
			},
 | 
						|
			name: "Test incoming pod's affinity: firstly check if all affinityTerms match, and then check if all topologyKeys match, and the match logic should be satified on the same pod",
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	selectorExpectedFailureReasons := []PredicateFailureReason{ErrNodeSelectorNotMatch}
 | 
						|
 | 
						|
	for indexTest, test := range tests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			nodeListInfo := FakeNodeListInfo(test.nodes)
 | 
						|
			nodeInfoMap := make(map[string]*schedulernodeinfo.NodeInfo)
 | 
						|
			for i, node := range test.nodes {
 | 
						|
				var podsOnNode []*v1.Pod
 | 
						|
				for _, pod := range test.pods {
 | 
						|
					if pod.Spec.NodeName == node.Name {
 | 
						|
						podsOnNode = append(podsOnNode, pod)
 | 
						|
					}
 | 
						|
				}
 | 
						|
 | 
						|
				nodeInfo := schedulernodeinfo.NewNodeInfo(podsOnNode...)
 | 
						|
				nodeInfo.SetNode(&test.nodes[i])
 | 
						|
				nodeInfoMap[node.Name] = nodeInfo
 | 
						|
			}
 | 
						|
 | 
						|
			for indexNode, node := range test.nodes {
 | 
						|
				testFit := PodAffinityChecker{
 | 
						|
					info:      nodeListInfo,
 | 
						|
					podLister: schedulertesting.FakePodLister(test.pods),
 | 
						|
				}
 | 
						|
 | 
						|
				var meta PredicateMetadata
 | 
						|
				if !test.nometa {
 | 
						|
					meta = GetPredicateMetadata(test.pod, nodeInfoMap)
 | 
						|
				}
 | 
						|
 | 
						|
				fits, reasons, _ := testFit.InterPodAffinityMatches(test.pod, meta, nodeInfoMap[node.Name])
 | 
						|
				if !fits && !reflect.DeepEqual(reasons, test.nodesExpectAffinityFailureReasons[indexNode]) {
 | 
						|
					t.Errorf("index: %d unexpected failure reasons: %v expect: %v", indexTest, reasons, test.nodesExpectAffinityFailureReasons[indexNode])
 | 
						|
				}
 | 
						|
				affinity := test.pod.Spec.Affinity
 | 
						|
				if affinity != nil && affinity.NodeAffinity != nil {
 | 
						|
					nodeInfo := schedulernodeinfo.NewNodeInfo()
 | 
						|
					nodeInfo.SetNode(&node)
 | 
						|
					nodeInfoMap := map[string]*schedulernodeinfo.NodeInfo{node.Name: nodeInfo}
 | 
						|
					fits2, reasons, err := PodMatchNodeSelector(test.pod, GetPredicateMetadata(test.pod, nodeInfoMap), nodeInfo)
 | 
						|
					if err != nil {
 | 
						|
						t.Errorf("unexpected error: %v", err)
 | 
						|
					}
 | 
						|
					if !fits2 && !reflect.DeepEqual(reasons, selectorExpectedFailureReasons) {
 | 
						|
						t.Errorf("unexpected failure reasons: %v, want: %v", reasons, selectorExpectedFailureReasons)
 | 
						|
					}
 | 
						|
					fits = fits && fits2
 | 
						|
				}
 | 
						|
 | 
						|
				if fits != test.fits[node.Name] {
 | 
						|
					t.Errorf("expected %v for %s got %v", test.fits[node.Name], node.Name, fits)
 | 
						|
				}
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestPodToleratesTaints(t *testing.T) {
 | 
						|
	podTolerateTaintsTests := []struct {
 | 
						|
		pod  *v1.Pod
 | 
						|
		node v1.Node
 | 
						|
		fits bool
 | 
						|
		name string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "pod0",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			node: v1.Node{
 | 
						|
				Spec: v1.NodeSpec{
 | 
						|
					Taints: []v1.Taint{{Key: "dedicated", Value: "user1", Effect: "NoSchedule"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			fits: false,
 | 
						|
			name: "A pod having no tolerations can't be scheduled onto a node with nonempty taints",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "pod1",
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Containers:  []v1.Container{{Image: "pod1:V1"}},
 | 
						|
					Tolerations: []v1.Toleration{{Key: "dedicated", Value: "user1", Effect: "NoSchedule"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			node: v1.Node{
 | 
						|
				Spec: v1.NodeSpec{
 | 
						|
					Taints: []v1.Taint{{Key: "dedicated", Value: "user1", Effect: "NoSchedule"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			fits: true,
 | 
						|
			name: "A pod which can be scheduled on a dedicated node assigned to user1 with effect NoSchedule",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "pod2",
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Containers:  []v1.Container{{Image: "pod2:V1"}},
 | 
						|
					Tolerations: []v1.Toleration{{Key: "dedicated", Operator: "Equal", Value: "user2", Effect: "NoSchedule"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			node: v1.Node{
 | 
						|
				Spec: v1.NodeSpec{
 | 
						|
					Taints: []v1.Taint{{Key: "dedicated", Value: "user1", Effect: "NoSchedule"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			fits: false,
 | 
						|
			name: "A pod which can't be scheduled on a dedicated node assigned to user2 with effect NoSchedule",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "pod2",
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Containers:  []v1.Container{{Image: "pod2:V1"}},
 | 
						|
					Tolerations: []v1.Toleration{{Key: "foo", Operator: "Exists", Effect: "NoSchedule"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			node: v1.Node{
 | 
						|
				Spec: v1.NodeSpec{
 | 
						|
					Taints: []v1.Taint{{Key: "foo", Value: "bar", Effect: "NoSchedule"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			fits: true,
 | 
						|
			name: "A pod can be scheduled onto the node, with a toleration uses operator Exists that tolerates the taints on the node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "pod2",
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Containers: []v1.Container{{Image: "pod2:V1"}},
 | 
						|
					Tolerations: []v1.Toleration{
 | 
						|
						{Key: "dedicated", Operator: "Equal", Value: "user2", Effect: "NoSchedule"},
 | 
						|
						{Key: "foo", Operator: "Exists", Effect: "NoSchedule"},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			node: v1.Node{
 | 
						|
				Spec: v1.NodeSpec{
 | 
						|
					Taints: []v1.Taint{
 | 
						|
						{Key: "dedicated", Value: "user2", Effect: "NoSchedule"},
 | 
						|
						{Key: "foo", Value: "bar", Effect: "NoSchedule"},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			fits: true,
 | 
						|
			name: "A pod has multiple tolerations, node has multiple taints, all the taints are tolerated, pod can be scheduled onto the node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "pod2",
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Containers:  []v1.Container{{Image: "pod2:V1"}},
 | 
						|
					Tolerations: []v1.Toleration{{Key: "foo", Operator: "Equal", Value: "bar", Effect: "PreferNoSchedule"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			node: v1.Node{
 | 
						|
				Spec: v1.NodeSpec{
 | 
						|
					Taints: []v1.Taint{
 | 
						|
						{Key: "foo", Value: "bar", Effect: "NoSchedule"},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			fits: false,
 | 
						|
			name: "A pod has a toleration that keys and values match the taint on the node, but (non-empty) effect doesn't match, " +
 | 
						|
				"can't be scheduled onto the node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "pod2",
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Containers:  []v1.Container{{Image: "pod2:V1"}},
 | 
						|
					Tolerations: []v1.Toleration{{Key: "foo", Operator: "Equal", Value: "bar"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			node: v1.Node{
 | 
						|
				Spec: v1.NodeSpec{
 | 
						|
					Taints: []v1.Taint{
 | 
						|
						{Key: "foo", Value: "bar", Effect: "NoSchedule"},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			fits: true,
 | 
						|
			name: "The pod has a toleration that keys and values match the taint on the node, the effect of toleration is empty, " +
 | 
						|
				"and the effect of taint is NoSchedule. Pod can be scheduled onto the node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "pod2",
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Containers:  []v1.Container{{Image: "pod2:V1"}},
 | 
						|
					Tolerations: []v1.Toleration{{Key: "dedicated", Operator: "Equal", Value: "user2", Effect: "NoSchedule"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			node: v1.Node{
 | 
						|
				Spec: v1.NodeSpec{
 | 
						|
					Taints: []v1.Taint{
 | 
						|
						{Key: "dedicated", Value: "user1", Effect: "PreferNoSchedule"},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			fits: true,
 | 
						|
			name: "The pod has a toleration that key and value don't match the taint on the node, " +
 | 
						|
				"but the effect of taint on node is PreferNochedule. Pod can be scheduled onto the node",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "pod2",
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Containers: []v1.Container{{Image: "pod2:V1"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			node: v1.Node{
 | 
						|
				Spec: v1.NodeSpec{
 | 
						|
					Taints: []v1.Taint{
 | 
						|
						{Key: "dedicated", Value: "user1", Effect: "PreferNoSchedule"},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			fits: true,
 | 
						|
			name: "The pod has no toleration, " +
 | 
						|
				"but the effect of taint on node is PreferNochedule. Pod can be scheduled onto the node",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	expectedFailureReasons := []PredicateFailureReason{ErrTaintsTolerationsNotMatch}
 | 
						|
 | 
						|
	for _, test := range podTolerateTaintsTests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			nodeInfo := schedulernodeinfo.NewNodeInfo()
 | 
						|
			nodeInfo.SetNode(&test.node)
 | 
						|
			fits, reasons, err := PodToleratesNodeTaints(test.pod, GetPredicateMetadata(test.pod, nil), nodeInfo)
 | 
						|
			if err != nil {
 | 
						|
				t.Errorf("unexpected error: %v", err)
 | 
						|
			}
 | 
						|
			if !fits && !reflect.DeepEqual(reasons, expectedFailureReasons) {
 | 
						|
				t.Errorf("unexpected failure reason: %v, want: %v", reasons, expectedFailureReasons)
 | 
						|
			}
 | 
						|
			if fits != test.fits {
 | 
						|
				t.Errorf("expected: %v got %v", test.fits, fits)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func makeEmptyNodeInfo(node *v1.Node) *schedulernodeinfo.NodeInfo {
 | 
						|
	nodeInfo := schedulernodeinfo.NewNodeInfo()
 | 
						|
	nodeInfo.SetNode(node)
 | 
						|
	return nodeInfo
 | 
						|
}
 | 
						|
 | 
						|
func TestPodSchedulesOnNodeWithMemoryPressureCondition(t *testing.T) {
 | 
						|
	// specify best-effort pod
 | 
						|
	bestEffortPod := &v1.Pod{
 | 
						|
		Spec: v1.PodSpec{
 | 
						|
			Containers: []v1.Container{
 | 
						|
				{
 | 
						|
					Name:            "container",
 | 
						|
					Image:           "image",
 | 
						|
					ImagePullPolicy: "Always",
 | 
						|
					// no requirements -> best effort pod
 | 
						|
					Resources: v1.ResourceRequirements{},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	// specify non-best-effort pod
 | 
						|
	nonBestEffortPod := &v1.Pod{
 | 
						|
		Spec: v1.PodSpec{
 | 
						|
			Containers: []v1.Container{
 | 
						|
				{
 | 
						|
					Name:            "container",
 | 
						|
					Image:           "image",
 | 
						|
					ImagePullPolicy: "Always",
 | 
						|
					// at least one requirement -> burstable pod
 | 
						|
					Resources: v1.ResourceRequirements{
 | 
						|
						Requests: makeAllocatableResources(100, 100, 100, 0, 0, 0),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	// specify a node with no memory pressure condition on
 | 
						|
	noMemoryPressureNode := &v1.Node{
 | 
						|
		Status: v1.NodeStatus{
 | 
						|
			Conditions: []v1.NodeCondition{
 | 
						|
				{
 | 
						|
					Type:   "Ready",
 | 
						|
					Status: "True",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	// specify a node with memory pressure condition on
 | 
						|
	memoryPressureNode := &v1.Node{
 | 
						|
		Status: v1.NodeStatus{
 | 
						|
			Conditions: []v1.NodeCondition{
 | 
						|
				{
 | 
						|
					Type:   "MemoryPressure",
 | 
						|
					Status: "True",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	tests := []struct {
 | 
						|
		pod      *v1.Pod
 | 
						|
		nodeInfo *schedulernodeinfo.NodeInfo
 | 
						|
		fits     bool
 | 
						|
		name     string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			pod:      bestEffortPod,
 | 
						|
			nodeInfo: makeEmptyNodeInfo(noMemoryPressureNode),
 | 
						|
			fits:     true,
 | 
						|
			name:     "best-effort pod schedulable on node without memory pressure condition on",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod:      bestEffortPod,
 | 
						|
			nodeInfo: makeEmptyNodeInfo(memoryPressureNode),
 | 
						|
			fits:     false,
 | 
						|
			name:     "best-effort pod not schedulable on node with memory pressure condition on",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod:      nonBestEffortPod,
 | 
						|
			nodeInfo: makeEmptyNodeInfo(memoryPressureNode),
 | 
						|
			fits:     true,
 | 
						|
			name:     "non best-effort pod schedulable on node with memory pressure condition on",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod:      nonBestEffortPod,
 | 
						|
			nodeInfo: makeEmptyNodeInfo(noMemoryPressureNode),
 | 
						|
			fits:     true,
 | 
						|
			name:     "non best-effort pod schedulable on node without memory pressure condition on",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	expectedFailureReasons := []PredicateFailureReason{ErrNodeUnderMemoryPressure}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			fits, reasons, err := CheckNodeMemoryPressurePredicate(test.pod, GetPredicateMetadata(test.pod, nil), test.nodeInfo)
 | 
						|
			if err != nil {
 | 
						|
				t.Errorf("unexpected error: %v", err)
 | 
						|
			}
 | 
						|
			if !fits && !reflect.DeepEqual(reasons, expectedFailureReasons) {
 | 
						|
				t.Errorf("unexpected failure reasons: %v, want: %v", reasons, expectedFailureReasons)
 | 
						|
			}
 | 
						|
			if fits != test.fits {
 | 
						|
				t.Errorf("expected %v got %v", test.fits, fits)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestPodSchedulesOnNodeWithDiskPressureCondition(t *testing.T) {
 | 
						|
	pod := &v1.Pod{
 | 
						|
		Spec: v1.PodSpec{
 | 
						|
			Containers: []v1.Container{
 | 
						|
				{
 | 
						|
					Name:            "container",
 | 
						|
					Image:           "image",
 | 
						|
					ImagePullPolicy: "Always",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	// specify a node with no disk pressure condition on
 | 
						|
	noPressureNode := &v1.Node{
 | 
						|
		Status: v1.NodeStatus{
 | 
						|
			Conditions: []v1.NodeCondition{
 | 
						|
				{
 | 
						|
					Type:   "Ready",
 | 
						|
					Status: "True",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	// specify a node with pressure condition on
 | 
						|
	pressureNode := &v1.Node{
 | 
						|
		Status: v1.NodeStatus{
 | 
						|
			Conditions: []v1.NodeCondition{
 | 
						|
				{
 | 
						|
					Type:   "DiskPressure",
 | 
						|
					Status: "True",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	tests := []struct {
 | 
						|
		pod      *v1.Pod
 | 
						|
		nodeInfo *schedulernodeinfo.NodeInfo
 | 
						|
		fits     bool
 | 
						|
		name     string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			pod:      pod,
 | 
						|
			nodeInfo: makeEmptyNodeInfo(noPressureNode),
 | 
						|
			fits:     true,
 | 
						|
			name:     "pod schedulable on node without pressure condition on",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod:      pod,
 | 
						|
			nodeInfo: makeEmptyNodeInfo(pressureNode),
 | 
						|
			fits:     false,
 | 
						|
			name:     "pod not schedulable on node with pressure condition on",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	expectedFailureReasons := []PredicateFailureReason{ErrNodeUnderDiskPressure}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			fits, reasons, err := CheckNodeDiskPressurePredicate(test.pod, GetPredicateMetadata(test.pod, nil), test.nodeInfo)
 | 
						|
			if err != nil {
 | 
						|
				t.Errorf("unexpected error: %v", err)
 | 
						|
			}
 | 
						|
			if !fits && !reflect.DeepEqual(reasons, expectedFailureReasons) {
 | 
						|
				t.Errorf("unexpected failure reasons: %v, want: %v", reasons, expectedFailureReasons)
 | 
						|
			}
 | 
						|
			if fits != test.fits {
 | 
						|
				t.Errorf("expected %v got %v", test.fits, fits)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestPodSchedulesOnNodeWithPIDPressureCondition(t *testing.T) {
 | 
						|
 | 
						|
	// specify a node with no pid pressure condition on
 | 
						|
	noPressureNode := &v1.Node{
 | 
						|
		Status: v1.NodeStatus{
 | 
						|
			Conditions: []v1.NodeCondition{
 | 
						|
				{
 | 
						|
					Type:   v1.NodeReady,
 | 
						|
					Status: v1.ConditionTrue,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	// specify a node with pressure condition on
 | 
						|
	pressureNode := &v1.Node{
 | 
						|
		Status: v1.NodeStatus{
 | 
						|
			Conditions: []v1.NodeCondition{
 | 
						|
				{
 | 
						|
					Type:   v1.NodePIDPressure,
 | 
						|
					Status: v1.ConditionTrue,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	tests := []struct {
 | 
						|
		nodeInfo *schedulernodeinfo.NodeInfo
 | 
						|
		fits     bool
 | 
						|
		name     string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			nodeInfo: makeEmptyNodeInfo(noPressureNode),
 | 
						|
			fits:     true,
 | 
						|
			name:     "pod schedulable on node without pressure condition on",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			nodeInfo: makeEmptyNodeInfo(pressureNode),
 | 
						|
			fits:     false,
 | 
						|
			name:     "pod not schedulable on node with pressure condition on",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	expectedFailureReasons := []PredicateFailureReason{ErrNodeUnderPIDPressure}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			fits, reasons, err := CheckNodePIDPressurePredicate(&v1.Pod{}, GetPredicateMetadata(&v1.Pod{}, nil), test.nodeInfo)
 | 
						|
			if err != nil {
 | 
						|
				t.Fatalf("unexpected error: %v", err)
 | 
						|
			}
 | 
						|
			if !fits && !reflect.DeepEqual(reasons, expectedFailureReasons) {
 | 
						|
				t.Errorf("unexpected failure reasons: %v, want: %v", reasons, expectedFailureReasons)
 | 
						|
			}
 | 
						|
			if fits != test.fits {
 | 
						|
				t.Errorf("expected %v got %v", test.fits, fits)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestNodeConditionPredicate(t *testing.T) {
 | 
						|
	tests := []struct {
 | 
						|
		name        string
 | 
						|
		node        *v1.Node
 | 
						|
		schedulable bool
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name:        "node1 considered",
 | 
						|
			node:        &v1.Node{ObjectMeta: metav1.ObjectMeta{Name: "node1"}, Status: v1.NodeStatus{Conditions: []v1.NodeCondition{{Type: v1.NodeReady, Status: v1.ConditionTrue}}}},
 | 
						|
			schedulable: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:        "node2 ignored - node not Ready",
 | 
						|
			node:        &v1.Node{ObjectMeta: metav1.ObjectMeta{Name: "node2"}, Status: v1.NodeStatus{Conditions: []v1.NodeCondition{{Type: v1.NodeReady, Status: v1.ConditionFalse}}}},
 | 
						|
			schedulable: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:        "node3 ignored - node unschedulable",
 | 
						|
			node:        &v1.Node{ObjectMeta: metav1.ObjectMeta{Name: "node9"}, Spec: v1.NodeSpec{Unschedulable: true}},
 | 
						|
			schedulable: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:        "node4 considered",
 | 
						|
			node:        &v1.Node{ObjectMeta: metav1.ObjectMeta{Name: "node10"}, Spec: v1.NodeSpec{Unschedulable: false}},
 | 
						|
			schedulable: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:        "node5 considered",
 | 
						|
			node:        &v1.Node{ObjectMeta: metav1.ObjectMeta{Name: "node11"}},
 | 
						|
			schedulable: true,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			nodeInfo := makeEmptyNodeInfo(test.node)
 | 
						|
			if fit, reasons, err := CheckNodeConditionPredicate(nil, nil, nodeInfo); fit != test.schedulable {
 | 
						|
				t.Errorf("%s: expected: %t, got %t; %+v, %v",
 | 
						|
					test.node.Name, test.schedulable, fit, reasons, err)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func createPodWithVolume(pod, pv, pvc string) *v1.Pod {
 | 
						|
	return &v1.Pod{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{Name: pod, Namespace: "default"},
 | 
						|
		Spec: v1.PodSpec{
 | 
						|
			Volumes: []v1.Volume{
 | 
						|
				{
 | 
						|
					Name: pv,
 | 
						|
					VolumeSource: v1.VolumeSource{
 | 
						|
						PersistentVolumeClaim: &v1.PersistentVolumeClaimVolumeSource{
 | 
						|
							ClaimName: pvc,
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestVolumeZonePredicate(t *testing.T) {
 | 
						|
	pvInfo := FakePersistentVolumeInfo{
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "Vol_1", Labels: map[string]string{kubeletapis.LabelZoneFailureDomain: "us-west1-a"}},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "Vol_2", Labels: map[string]string{kubeletapis.LabelZoneRegion: "us-west1-b", "uselessLabel": "none"}},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "Vol_3", Labels: map[string]string{kubeletapis.LabelZoneRegion: "us-west1-c"}},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	pvcInfo := FakePersistentVolumeClaimInfo{
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "PVC_1", Namespace: "default"},
 | 
						|
			Spec:       v1.PersistentVolumeClaimSpec{VolumeName: "Vol_1"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "PVC_2", Namespace: "default"},
 | 
						|
			Spec:       v1.PersistentVolumeClaimSpec{VolumeName: "Vol_2"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "PVC_3", Namespace: "default"},
 | 
						|
			Spec:       v1.PersistentVolumeClaimSpec{VolumeName: "Vol_3"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "PVC_4", Namespace: "default"},
 | 
						|
			Spec:       v1.PersistentVolumeClaimSpec{VolumeName: "Vol_not_exist"},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	tests := []struct {
 | 
						|
		name string
 | 
						|
		Pod  *v1.Pod
 | 
						|
		Fits bool
 | 
						|
		Node *v1.Node
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name: "pod without volume",
 | 
						|
			Pod: &v1.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "pod_1", Namespace: "default"},
 | 
						|
			},
 | 
						|
			Node: &v1.Node{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:   "host1",
 | 
						|
					Labels: map[string]string{kubeletapis.LabelZoneFailureDomain: "us-west1-a"},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Fits: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "node without labels",
 | 
						|
			Pod:  createPodWithVolume("pod_1", "vol_1", "PVC_1"),
 | 
						|
			Node: &v1.Node{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "host1",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Fits: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "label zone failure domain matched",
 | 
						|
			Pod:  createPodWithVolume("pod_1", "vol_1", "PVC_1"),
 | 
						|
			Node: &v1.Node{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:   "host1",
 | 
						|
					Labels: map[string]string{kubeletapis.LabelZoneFailureDomain: "us-west1-a", "uselessLabel": "none"},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Fits: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "label zone region matched",
 | 
						|
			Pod:  createPodWithVolume("pod_1", "vol_1", "PVC_2"),
 | 
						|
			Node: &v1.Node{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:   "host1",
 | 
						|
					Labels: map[string]string{kubeletapis.LabelZoneRegion: "us-west1-b", "uselessLabel": "none"},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Fits: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "label zone region failed match",
 | 
						|
			Pod:  createPodWithVolume("pod_1", "vol_1", "PVC_2"),
 | 
						|
			Node: &v1.Node{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:   "host1",
 | 
						|
					Labels: map[string]string{kubeletapis.LabelZoneRegion: "no_us-west1-b", "uselessLabel": "none"},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Fits: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "label zone failure domain failed match",
 | 
						|
			Pod:  createPodWithVolume("pod_1", "vol_1", "PVC_1"),
 | 
						|
			Node: &v1.Node{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:   "host1",
 | 
						|
					Labels: map[string]string{kubeletapis.LabelZoneFailureDomain: "no_us-west1-a", "uselessLabel": "none"},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Fits: false,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	expectedFailureReasons := []PredicateFailureReason{ErrVolumeZoneConflict}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			fit := NewVolumeZonePredicate(pvInfo, pvcInfo, nil)
 | 
						|
			node := &schedulernodeinfo.NodeInfo{}
 | 
						|
			node.SetNode(test.Node)
 | 
						|
 | 
						|
			fits, reasons, err := fit(test.Pod, nil, node)
 | 
						|
			if err != nil {
 | 
						|
				t.Errorf("unexpected error: %v", err)
 | 
						|
			}
 | 
						|
			if !fits && !reflect.DeepEqual(reasons, expectedFailureReasons) {
 | 
						|
				t.Errorf("unexpected failure reasons: %v, want: %v", reasons, expectedFailureReasons)
 | 
						|
			}
 | 
						|
			if fits != test.Fits {
 | 
						|
				t.Errorf("expected %v got %v", test.Fits, fits)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestVolumeZonePredicateMultiZone(t *testing.T) {
 | 
						|
	pvInfo := FakePersistentVolumeInfo{
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "Vol_1", Labels: map[string]string{kubeletapis.LabelZoneFailureDomain: "us-west1-a"}},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "Vol_2", Labels: map[string]string{kubeletapis.LabelZoneFailureDomain: "us-west1-b", "uselessLabel": "none"}},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "Vol_3", Labels: map[string]string{kubeletapis.LabelZoneFailureDomain: "us-west1-c__us-west1-a"}},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	pvcInfo := FakePersistentVolumeClaimInfo{
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "PVC_1", Namespace: "default"},
 | 
						|
			Spec:       v1.PersistentVolumeClaimSpec{VolumeName: "Vol_1"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "PVC_2", Namespace: "default"},
 | 
						|
			Spec:       v1.PersistentVolumeClaimSpec{VolumeName: "Vol_2"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "PVC_3", Namespace: "default"},
 | 
						|
			Spec:       v1.PersistentVolumeClaimSpec{VolumeName: "Vol_3"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "PVC_4", Namespace: "default"},
 | 
						|
			Spec:       v1.PersistentVolumeClaimSpec{VolumeName: "Vol_not_exist"},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	tests := []struct {
 | 
						|
		name string
 | 
						|
		Pod  *v1.Pod
 | 
						|
		Fits bool
 | 
						|
		Node *v1.Node
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name: "node without labels",
 | 
						|
			Pod:  createPodWithVolume("pod_1", "Vol_3", "PVC_3"),
 | 
						|
			Node: &v1.Node{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "host1",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Fits: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "label zone failure domain matched",
 | 
						|
			Pod:  createPodWithVolume("pod_1", "Vol_3", "PVC_3"),
 | 
						|
			Node: &v1.Node{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:   "host1",
 | 
						|
					Labels: map[string]string{kubeletapis.LabelZoneFailureDomain: "us-west1-a", "uselessLabel": "none"},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Fits: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "label zone failure domain failed match",
 | 
						|
			Pod:  createPodWithVolume("pod_1", "vol_1", "PVC_1"),
 | 
						|
			Node: &v1.Node{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:   "host1",
 | 
						|
					Labels: map[string]string{kubeletapis.LabelZoneFailureDomain: "us-west1-b", "uselessLabel": "none"},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Fits: false,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	expectedFailureReasons := []PredicateFailureReason{ErrVolumeZoneConflict}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			fit := NewVolumeZonePredicate(pvInfo, pvcInfo, nil)
 | 
						|
			node := &schedulernodeinfo.NodeInfo{}
 | 
						|
			node.SetNode(test.Node)
 | 
						|
 | 
						|
			fits, reasons, err := fit(test.Pod, nil, node)
 | 
						|
			if err != nil {
 | 
						|
				t.Errorf("unexpected error: %v", err)
 | 
						|
			}
 | 
						|
			if !fits && !reflect.DeepEqual(reasons, expectedFailureReasons) {
 | 
						|
				t.Errorf("unexpected failure reasons: %v, want: %v", reasons, expectedFailureReasons)
 | 
						|
			}
 | 
						|
			if fits != test.Fits {
 | 
						|
				t.Errorf("expected %v got %v", test.Fits, fits)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestVolumeZonePredicateWithVolumeBinding(t *testing.T) {
 | 
						|
	var (
 | 
						|
		modeWait = storagev1.VolumeBindingWaitForFirstConsumer
 | 
						|
 | 
						|
		class0         = "Class_0"
 | 
						|
		classWait      = "Class_Wait"
 | 
						|
		classImmediate = "Class_Immediate"
 | 
						|
	)
 | 
						|
 | 
						|
	classInfo := FakeStorageClassInfo{
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: classImmediate},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta:        metav1.ObjectMeta{Name: classWait},
 | 
						|
			VolumeBindingMode: &modeWait,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	pvInfo := FakePersistentVolumeInfo{
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "Vol_1", Labels: map[string]string{kubeletapis.LabelZoneFailureDomain: "us-west1-a"}},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	pvcInfo := FakePersistentVolumeClaimInfo{
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "PVC_1", Namespace: "default"},
 | 
						|
			Spec:       v1.PersistentVolumeClaimSpec{VolumeName: "Vol_1"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "PVC_NoSC", Namespace: "default"},
 | 
						|
			Spec:       v1.PersistentVolumeClaimSpec{StorageClassName: &class0},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "PVC_EmptySC", Namespace: "default"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "PVC_WaitSC", Namespace: "default"},
 | 
						|
			Spec:       v1.PersistentVolumeClaimSpec{StorageClassName: &classWait},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "PVC_ImmediateSC", Namespace: "default"},
 | 
						|
			Spec:       v1.PersistentVolumeClaimSpec{StorageClassName: &classImmediate},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	testNode := &v1.Node{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name:   "host1",
 | 
						|
			Labels: map[string]string{kubeletapis.LabelZoneFailureDomain: "us-west1-a", "uselessLabel": "none"},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	tests := []struct {
 | 
						|
		name          string
 | 
						|
		Pod           *v1.Pod
 | 
						|
		Fits          bool
 | 
						|
		Node          *v1.Node
 | 
						|
		ExpectFailure bool
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name: "label zone failure domain matched",
 | 
						|
			Pod:  createPodWithVolume("pod_1", "vol_1", "PVC_1"),
 | 
						|
			Node: testNode,
 | 
						|
			Fits: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:          "unbound volume empty storage class",
 | 
						|
			Pod:           createPodWithVolume("pod_1", "vol_1", "PVC_EmptySC"),
 | 
						|
			Node:          testNode,
 | 
						|
			Fits:          false,
 | 
						|
			ExpectFailure: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:          "unbound volume no storage class",
 | 
						|
			Pod:           createPodWithVolume("pod_1", "vol_1", "PVC_NoSC"),
 | 
						|
			Node:          testNode,
 | 
						|
			Fits:          false,
 | 
						|
			ExpectFailure: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:          "unbound volume immediate binding mode",
 | 
						|
			Pod:           createPodWithVolume("pod_1", "vol_1", "PVC_ImmediateSC"),
 | 
						|
			Node:          testNode,
 | 
						|
			Fits:          false,
 | 
						|
			ExpectFailure: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "unbound volume wait binding mode",
 | 
						|
			Pod:  createPodWithVolume("pod_1", "vol_1", "PVC_WaitSC"),
 | 
						|
			Node: testNode,
 | 
						|
			Fits: true,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			fit := NewVolumeZonePredicate(pvInfo, pvcInfo, classInfo)
 | 
						|
			node := &schedulernodeinfo.NodeInfo{}
 | 
						|
			node.SetNode(test.Node)
 | 
						|
 | 
						|
			fits, _, err := fit(test.Pod, nil, node)
 | 
						|
			if !test.ExpectFailure && err != nil {
 | 
						|
				t.Errorf("unexpected error: %v", err)
 | 
						|
			}
 | 
						|
			if test.ExpectFailure && err == nil {
 | 
						|
				t.Errorf("expected error, got success")
 | 
						|
			}
 | 
						|
			if fits != test.Fits {
 | 
						|
				t.Errorf("expected %v got %v", test.Fits, fits)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
 | 
						|
}
 | 
						|
 | 
						|
func TestGetMaxVols(t *testing.T) {
 | 
						|
	previousValue := os.Getenv(KubeMaxPDVols)
 | 
						|
 | 
						|
	tests := []struct {
 | 
						|
		rawMaxVols string
 | 
						|
		expected   int
 | 
						|
		name       string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			rawMaxVols: "invalid",
 | 
						|
			expected:   -1,
 | 
						|
			name:       "Unable to parse maximum PD volumes value, using default value",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			rawMaxVols: "-2",
 | 
						|
			expected:   -1,
 | 
						|
			name:       "Maximum PD volumes must be a positive value, using default value",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			rawMaxVols: "40",
 | 
						|
			expected:   40,
 | 
						|
			name:       "Parse maximum PD volumes value from env",
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			os.Setenv(KubeMaxPDVols, test.rawMaxVols)
 | 
						|
			result := getMaxVolLimitFromEnv()
 | 
						|
			if result != test.expected {
 | 
						|
				t.Errorf("expected %v got %v", test.expected, result)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
 | 
						|
	os.Unsetenv(KubeMaxPDVols)
 | 
						|
	if previousValue != "" {
 | 
						|
		os.Setenv(KubeMaxPDVols, previousValue)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestCheckNodeUnschedulablePredicate(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		name string
 | 
						|
		pod  *v1.Pod
 | 
						|
		node *v1.Node
 | 
						|
		fit  bool
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name: "Does not schedule pod to unschedulable node (node.Spec.Unschedulable==true)",
 | 
						|
			pod:  &v1.Pod{},
 | 
						|
			node: &v1.Node{
 | 
						|
				Spec: v1.NodeSpec{
 | 
						|
					Unschedulable: true,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			fit: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Schedule pod to normal node",
 | 
						|
			pod:  &v1.Pod{},
 | 
						|
			node: &v1.Node{
 | 
						|
				Spec: v1.NodeSpec{
 | 
						|
					Unschedulable: false,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			fit: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Schedule pod with toleration to unschedulable node (node.Spec.Unschedulable==true)",
 | 
						|
			pod: &v1.Pod{
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Tolerations: []v1.Toleration{
 | 
						|
						{
 | 
						|
							Key:    schedulerapi.TaintNodeUnschedulable,
 | 
						|
							Effect: v1.TaintEffectNoSchedule,
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			node: &v1.Node{
 | 
						|
				Spec: v1.NodeSpec{
 | 
						|
					Unschedulable: true,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			fit: true,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, test := range testCases {
 | 
						|
		nodeInfo := schedulernodeinfo.NewNodeInfo()
 | 
						|
		nodeInfo.SetNode(test.node)
 | 
						|
		fit, _, err := CheckNodeUnschedulablePredicate(test.pod, nil, nodeInfo)
 | 
						|
		if err != nil {
 | 
						|
			t.Fatalf("Failed to check node unschedulable: %v", err)
 | 
						|
		}
 | 
						|
 | 
						|
		if fit != test.fit {
 | 
						|
			t.Errorf("Unexpected fit: expected %v, got %v", test.fit, fit)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 |