mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-04 04:08:16 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			12646 lines
		
	
	
		
			373 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			12646 lines
		
	
	
		
			373 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2014 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package validation
 | 
						|
 | 
						|
import (
 | 
						|
	"bytes"
 | 
						|
	"fmt"
 | 
						|
	"math"
 | 
						|
	"reflect"
 | 
						|
	"strings"
 | 
						|
	"testing"
 | 
						|
 | 
						|
	"k8s.io/api/core/v1"
 | 
						|
	"k8s.io/apimachinery/pkg/api/resource"
 | 
						|
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						|
	"k8s.io/apimachinery/pkg/util/intstr"
 | 
						|
	"k8s.io/apimachinery/pkg/util/validation"
 | 
						|
	"k8s.io/apimachinery/pkg/util/validation/field"
 | 
						|
	utilfeature "k8s.io/apiserver/pkg/util/feature"
 | 
						|
	utilfeaturetesting "k8s.io/apiserver/pkg/util/feature/testing"
 | 
						|
	"k8s.io/kubernetes/pkg/api/legacyscheme"
 | 
						|
	_ "k8s.io/kubernetes/pkg/api/testapi"
 | 
						|
	"k8s.io/kubernetes/pkg/apis/core"
 | 
						|
	"k8s.io/kubernetes/pkg/capabilities"
 | 
						|
	"k8s.io/kubernetes/pkg/features"
 | 
						|
	"k8s.io/kubernetes/pkg/security/apparmor"
 | 
						|
	utilpointer "k8s.io/kubernetes/pkg/util/pointer"
 | 
						|
)
 | 
						|
 | 
						|
const (
 | 
						|
	dnsLabelErrMsg          = "a DNS-1123 label must consist of"
 | 
						|
	dnsSubdomainLabelErrMsg = "a DNS-1123 subdomain"
 | 
						|
	envVarNameErrMsg        = "a valid environment variable name must consist of"
 | 
						|
)
 | 
						|
 | 
						|
func newHostPathType(pathType string) *core.HostPathType {
 | 
						|
	hostPathType := new(core.HostPathType)
 | 
						|
	*hostPathType = core.HostPathType(pathType)
 | 
						|
	return hostPathType
 | 
						|
}
 | 
						|
 | 
						|
func testVolume(name string, namespace string, spec core.PersistentVolumeSpec) *core.PersistentVolume {
 | 
						|
	objMeta := metav1.ObjectMeta{Name: name}
 | 
						|
	if namespace != "" {
 | 
						|
		objMeta.Namespace = namespace
 | 
						|
	}
 | 
						|
 | 
						|
	return &core.PersistentVolume{
 | 
						|
		ObjectMeta: objMeta,
 | 
						|
		Spec:       spec,
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidatePersistentVolumes(t *testing.T) {
 | 
						|
	validMode := core.PersistentVolumeFilesystem
 | 
						|
	scenarios := map[string]struct {
 | 
						|
		isExpectedFailure bool
 | 
						|
		volume            *core.PersistentVolume
 | 
						|
	}{
 | 
						|
		"good-volume": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			volume: testVolume("foo", "", core.PersistentVolumeSpec{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
				PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/foo",
 | 
						|
						Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"good-volume-with-capacity-unit": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			volume: testVolume("foo", "", core.PersistentVolumeSpec{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceStorage): resource.MustParse("10Gi"),
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
				PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/foo",
 | 
						|
						Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"good-volume-without-capacity-unit": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			volume: testVolume("foo", "", core.PersistentVolumeSpec{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceStorage): resource.MustParse("10"),
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
				PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/foo",
 | 
						|
						Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"good-volume-with-storage-class": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			volume: testVolume("foo", "", core.PersistentVolumeSpec{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
				PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/foo",
 | 
						|
						Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
					},
 | 
						|
				},
 | 
						|
				StorageClassName: "valid",
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"good-volume-with-retain-policy": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			volume: testVolume("foo", "", core.PersistentVolumeSpec{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
				PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/foo",
 | 
						|
						Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
					},
 | 
						|
				},
 | 
						|
				PersistentVolumeReclaimPolicy: core.PersistentVolumeReclaimRetain,
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"invalid-accessmode": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			volume: testVolume("foo", "", core.PersistentVolumeSpec{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{"fakemode"},
 | 
						|
				PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/foo",
 | 
						|
						Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"invalid-reclaimpolicy": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			volume: testVolume("foo", "", core.PersistentVolumeSpec{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
				PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/foo",
 | 
						|
						Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
					},
 | 
						|
				},
 | 
						|
				PersistentVolumeReclaimPolicy: "fakeReclaimPolicy",
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"unexpected-namespace": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			volume: testVolume("foo", "unexpected-namespace", core.PersistentVolumeSpec{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
				PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/foo",
 | 
						|
						Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"missing-volume-source": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			volume: testVolume("foo", "", core.PersistentVolumeSpec{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"bad-name": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			volume: testVolume("123*Bad(Name", "unexpected-namespace", core.PersistentVolumeSpec{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
				PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/foo",
 | 
						|
						Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"missing-name": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			volume: testVolume("", "", core.PersistentVolumeSpec{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
				PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/foo",
 | 
						|
						Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"missing-capacity": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			volume: testVolume("foo", "", core.PersistentVolumeSpec{
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
				PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/foo",
 | 
						|
						Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"bad-volume-zero-capacity": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			volume: testVolume("foo", "", core.PersistentVolumeSpec{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceStorage): resource.MustParse("0"),
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
				PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/foo",
 | 
						|
						Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"missing-accessmodes": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			volume: testVolume("goodname", "missing-accessmodes", core.PersistentVolumeSpec{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
				PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/foo",
 | 
						|
						Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"too-many-sources": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			volume: testVolume("foo", "", core.PersistentVolumeSpec{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceStorage): resource.MustParse("5G"),
 | 
						|
				},
 | 
						|
				PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/foo",
 | 
						|
						Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
					},
 | 
						|
					GCEPersistentDisk: &core.GCEPersistentDiskVolumeSource{PDName: "foo", FSType: "ext4"},
 | 
						|
				},
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"host mount of / with recycle reclaim policy": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			volume: testVolume("bad-recycle-do-not-want", "", core.PersistentVolumeSpec{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
				PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/",
 | 
						|
						Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
					},
 | 
						|
				},
 | 
						|
				PersistentVolumeReclaimPolicy: core.PersistentVolumeReclaimRecycle,
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"host mount of / with recycle reclaim policy 2": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			volume: testVolume("bad-recycle-do-not-want", "", core.PersistentVolumeSpec{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
				PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/a/..",
 | 
						|
						Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
					},
 | 
						|
				},
 | 
						|
				PersistentVolumeReclaimPolicy: core.PersistentVolumeReclaimRecycle,
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"invalid-storage-class-name": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			volume: testVolume("invalid-storage-class-name", "", core.PersistentVolumeSpec{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
				PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/foo",
 | 
						|
						Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
					},
 | 
						|
				},
 | 
						|
				StorageClassName: "-invalid-",
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		// VolumeMode alpha feature disabled
 | 
						|
		// TODO: remove when no longer alpha
 | 
						|
		"alpha disabled valid volume mode": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			volume: testVolume("foo", "", core.PersistentVolumeSpec{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
				PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/foo",
 | 
						|
						Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
					},
 | 
						|
				},
 | 
						|
				StorageClassName: "valid",
 | 
						|
				VolumeMode:       &validMode,
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"bad-hostpath-volume-backsteps": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			volume: testVolume("foo", "", core.PersistentVolumeSpec{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
				PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/foo/..",
 | 
						|
						Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
					},
 | 
						|
				},
 | 
						|
				StorageClassName: "backstep-hostpath",
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"volume-node-affinity": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			volume:            testVolumeWithNodeAffinity(simpleVolumeNodeAffinity("foo", "bar")),
 | 
						|
		},
 | 
						|
		"volume-empty-node-affinity": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			volume:            testVolumeWithNodeAffinity(&core.VolumeNodeAffinity{}),
 | 
						|
		},
 | 
						|
		"volume-bad-node-affinity": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			volume: testVolumeWithNodeAffinity(
 | 
						|
				&core.VolumeNodeAffinity{
 | 
						|
					Required: &core.NodeSelector{
 | 
						|
						NodeSelectorTerms: []core.NodeSelectorTerm{
 | 
						|
							{
 | 
						|
								MatchExpressions: []core.NodeSelectorRequirement{
 | 
						|
									{
 | 
						|
										Operator: core.NodeSelectorOpIn,
 | 
						|
										Values:   []string{"test-label-value"},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				}),
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for name, scenario := range scenarios {
 | 
						|
		errs := ValidatePersistentVolume(scenario.volume)
 | 
						|
		if len(errs) == 0 && scenario.isExpectedFailure {
 | 
						|
			t.Errorf("Unexpected success for scenario: %s", name)
 | 
						|
		}
 | 
						|
		if len(errs) > 0 && !scenario.isExpectedFailure {
 | 
						|
			t.Errorf("Unexpected failure for scenario: %s - %+v", name, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
}
 | 
						|
 | 
						|
func TestValidatePersistentVolumeSourceUpdate(t *testing.T) {
 | 
						|
	validVolume := testVolume("foo", "", core.PersistentVolumeSpec{
 | 
						|
		Capacity: core.ResourceList{
 | 
						|
			core.ResourceName(core.ResourceStorage): resource.MustParse("1G"),
 | 
						|
		},
 | 
						|
		AccessModes: []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
		PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
			HostPath: &core.HostPathVolumeSource{
 | 
						|
				Path: "/foo",
 | 
						|
				Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		StorageClassName: "valid",
 | 
						|
	})
 | 
						|
	validPvSourceNoUpdate := validVolume.DeepCopy()
 | 
						|
	invalidPvSourceUpdateType := validVolume.DeepCopy()
 | 
						|
	invalidPvSourceUpdateType.Spec.PersistentVolumeSource = core.PersistentVolumeSource{
 | 
						|
		FlexVolume: &core.FlexPersistentVolumeSource{
 | 
						|
			Driver: "kubernetes.io/blue",
 | 
						|
			FSType: "ext4",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	invalidPvSourceUpdateDeep := validVolume.DeepCopy()
 | 
						|
	invalidPvSourceUpdateDeep.Spec.PersistentVolumeSource = core.PersistentVolumeSource{
 | 
						|
		HostPath: &core.HostPathVolumeSource{
 | 
						|
			Path: "/updated",
 | 
						|
			Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
		},
 | 
						|
	}
 | 
						|
	scenarios := map[string]struct {
 | 
						|
		isExpectedFailure bool
 | 
						|
		oldVolume         *core.PersistentVolume
 | 
						|
		newVolume         *core.PersistentVolume
 | 
						|
	}{
 | 
						|
		"condition-no-update": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			oldVolume:         validVolume,
 | 
						|
			newVolume:         validPvSourceNoUpdate,
 | 
						|
		},
 | 
						|
		"condition-update-source-type": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldVolume:         validVolume,
 | 
						|
			newVolume:         invalidPvSourceUpdateType,
 | 
						|
		},
 | 
						|
		"condition-update-source-deep": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldVolume:         validVolume,
 | 
						|
			newVolume:         invalidPvSourceUpdateDeep,
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for name, scenario := range scenarios {
 | 
						|
		errs := ValidatePersistentVolumeUpdate(scenario.newVolume, scenario.oldVolume)
 | 
						|
		if len(errs) == 0 && scenario.isExpectedFailure {
 | 
						|
			t.Errorf("Unexpected success for scenario: %s", name)
 | 
						|
		}
 | 
						|
		if len(errs) > 0 && !scenario.isExpectedFailure {
 | 
						|
			t.Errorf("Unexpected failure for scenario: %s - %+v", name, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func testLocalVolume(path string, affinity *core.VolumeNodeAffinity) core.PersistentVolumeSpec {
 | 
						|
	return core.PersistentVolumeSpec{
 | 
						|
		Capacity: core.ResourceList{
 | 
						|
			core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
		},
 | 
						|
		AccessModes: []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
		PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
			Local: &core.LocalVolumeSource{
 | 
						|
				Path: path,
 | 
						|
			},
 | 
						|
		},
 | 
						|
		NodeAffinity:     affinity,
 | 
						|
		StorageClassName: "test-storage-class",
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateLocalVolumes(t *testing.T) {
 | 
						|
	scenarios := map[string]struct {
 | 
						|
		isExpectedFailure bool
 | 
						|
		volume            *core.PersistentVolume
 | 
						|
	}{
 | 
						|
		"alpha invalid local volume nil annotations": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			volume: testVolume(
 | 
						|
				"invalid-local-volume-nil-annotations",
 | 
						|
				"",
 | 
						|
				testLocalVolume("/foo", nil)),
 | 
						|
		},
 | 
						|
		"valid local volume": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			volume: testVolume("valid-local-volume", "",
 | 
						|
				testLocalVolume("/foo", simpleVolumeNodeAffinity("foo", "bar"))),
 | 
						|
		},
 | 
						|
		"invalid local volume no node affinity": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			volume: testVolume("invalid-local-volume-no-node-affinity", "",
 | 
						|
				testLocalVolume("/foo", nil)),
 | 
						|
		},
 | 
						|
		"invalid local volume empty path": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			volume: testVolume("invalid-local-volume-empty-path", "",
 | 
						|
				testLocalVolume("", simpleVolumeNodeAffinity("foo", "bar"))),
 | 
						|
		},
 | 
						|
		"invalid-local-volume-backsteps": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			volume: testVolume("foo", "",
 | 
						|
				testLocalVolume("/foo/..", simpleVolumeNodeAffinity("foo", "bar"))),
 | 
						|
		},
 | 
						|
		"valid-local-volume-relative-path": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			volume: testVolume("foo", "",
 | 
						|
				testLocalVolume("foo", simpleVolumeNodeAffinity("foo", "bar"))),
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for name, scenario := range scenarios {
 | 
						|
		errs := ValidatePersistentVolume(scenario.volume)
 | 
						|
		if len(errs) == 0 && scenario.isExpectedFailure {
 | 
						|
			t.Errorf("Unexpected success for scenario: %s", name)
 | 
						|
		}
 | 
						|
		if len(errs) > 0 && !scenario.isExpectedFailure {
 | 
						|
			t.Errorf("Unexpected failure for scenario: %s - %+v", name, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateLocalVolumesDisabled(t *testing.T) {
 | 
						|
	scenarios := map[string]struct {
 | 
						|
		isExpectedFailure bool
 | 
						|
		volume            *core.PersistentVolume
 | 
						|
	}{
 | 
						|
		"feature disabled valid local volume": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			volume: testVolume("valid-local-volume", "",
 | 
						|
				testLocalVolume("/foo", simpleVolumeNodeAffinity("foo", "bar"))),
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	utilfeature.DefaultFeatureGate.Set("PersistentLocalVolumes=false")
 | 
						|
	for name, scenario := range scenarios {
 | 
						|
		errs := ValidatePersistentVolume(scenario.volume)
 | 
						|
		if len(errs) == 0 && scenario.isExpectedFailure {
 | 
						|
			t.Errorf("Unexpected success for scenario: %s", name)
 | 
						|
		}
 | 
						|
		if len(errs) > 0 && !scenario.isExpectedFailure {
 | 
						|
			t.Errorf("Unexpected failure for scenario: %s - %+v", name, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	utilfeature.DefaultFeatureGate.Set("PersistentLocalVolumes=true")
 | 
						|
 | 
						|
	utilfeature.DefaultFeatureGate.Set("VolumeScheduling=false")
 | 
						|
	for name, scenario := range scenarios {
 | 
						|
		errs := ValidatePersistentVolume(scenario.volume)
 | 
						|
		if len(errs) == 0 && scenario.isExpectedFailure {
 | 
						|
			t.Errorf("Unexpected success for scenario: %s", name)
 | 
						|
		}
 | 
						|
		if len(errs) > 0 && !scenario.isExpectedFailure {
 | 
						|
			t.Errorf("Unexpected failure for scenario: %s - %+v", name, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	utilfeature.DefaultFeatureGate.Set("VolumeScheduling=true")
 | 
						|
}
 | 
						|
 | 
						|
func testVolumeWithNodeAffinity(affinity *core.VolumeNodeAffinity) *core.PersistentVolume {
 | 
						|
	return testVolume("test-affinity-volume", "",
 | 
						|
		core.PersistentVolumeSpec{
 | 
						|
			Capacity: core.ResourceList{
 | 
						|
				core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
			},
 | 
						|
			AccessModes: []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
			PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
				GCEPersistentDisk: &core.GCEPersistentDiskVolumeSource{
 | 
						|
					PDName: "foo",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			StorageClassName: "test-storage-class",
 | 
						|
			NodeAffinity:     affinity,
 | 
						|
		})
 | 
						|
}
 | 
						|
 | 
						|
func simpleVolumeNodeAffinity(key, value string) *core.VolumeNodeAffinity {
 | 
						|
	return &core.VolumeNodeAffinity{
 | 
						|
		Required: &core.NodeSelector{
 | 
						|
			NodeSelectorTerms: []core.NodeSelectorTerm{
 | 
						|
				{
 | 
						|
					MatchExpressions: []core.NodeSelectorRequirement{
 | 
						|
						{
 | 
						|
							Key:      key,
 | 
						|
							Operator: core.NodeSelectorOpIn,
 | 
						|
							Values:   []string{value},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateVolumeNodeAffinityUpdate(t *testing.T) {
 | 
						|
	scenarios := map[string]struct {
 | 
						|
		isExpectedFailure bool
 | 
						|
		oldPV             *core.PersistentVolume
 | 
						|
		newPV             *core.PersistentVolume
 | 
						|
	}{
 | 
						|
		"nil-nothing-changed": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			oldPV:             testVolumeWithNodeAffinity(nil),
 | 
						|
			newPV:             testVolumeWithNodeAffinity(nil),
 | 
						|
		},
 | 
						|
		"affinity-nothing-changed": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			oldPV:             testVolumeWithNodeAffinity(simpleVolumeNodeAffinity("foo", "bar")),
 | 
						|
			newPV:             testVolumeWithNodeAffinity(simpleVolumeNodeAffinity("foo", "bar")),
 | 
						|
		},
 | 
						|
		"affinity-changed": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldPV:             testVolumeWithNodeAffinity(simpleVolumeNodeAffinity("foo", "bar")),
 | 
						|
			newPV:             testVolumeWithNodeAffinity(simpleVolumeNodeAffinity("foo", "bar2")),
 | 
						|
		},
 | 
						|
		"nil-to-obj": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			oldPV:             testVolumeWithNodeAffinity(nil),
 | 
						|
			newPV:             testVolumeWithNodeAffinity(simpleVolumeNodeAffinity("foo", "bar")),
 | 
						|
		},
 | 
						|
		"obj-to-nil": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldPV:             testVolumeWithNodeAffinity(simpleVolumeNodeAffinity("foo", "bar")),
 | 
						|
			newPV:             testVolumeWithNodeAffinity(nil),
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for name, scenario := range scenarios {
 | 
						|
		errs := ValidatePersistentVolumeUpdate(scenario.newPV, scenario.oldPV)
 | 
						|
		if len(errs) == 0 && scenario.isExpectedFailure {
 | 
						|
			t.Errorf("Unexpected success for scenario: %s", name)
 | 
						|
		}
 | 
						|
		if len(errs) > 0 && !scenario.isExpectedFailure {
 | 
						|
			t.Errorf("Unexpected failure for scenario: %s - %+v", name, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func testVolumeClaim(name string, namespace string, spec core.PersistentVolumeClaimSpec) *core.PersistentVolumeClaim {
 | 
						|
	return &core.PersistentVolumeClaim{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{Name: name, Namespace: namespace},
 | 
						|
		Spec:       spec,
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func testVolumeClaimWithStatus(
 | 
						|
	name, namespace string,
 | 
						|
	spec core.PersistentVolumeClaimSpec,
 | 
						|
	status core.PersistentVolumeClaimStatus) *core.PersistentVolumeClaim {
 | 
						|
	return &core.PersistentVolumeClaim{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{Name: name, Namespace: namespace},
 | 
						|
		Spec:       spec,
 | 
						|
		Status:     status,
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func testVolumeClaimStorageClass(name string, namespace string, annval string, spec core.PersistentVolumeClaimSpec) *core.PersistentVolumeClaim {
 | 
						|
	annotations := map[string]string{
 | 
						|
		v1.BetaStorageClassAnnotation: annval,
 | 
						|
	}
 | 
						|
 | 
						|
	return &core.PersistentVolumeClaim{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name:        name,
 | 
						|
			Namespace:   namespace,
 | 
						|
			Annotations: annotations,
 | 
						|
		},
 | 
						|
		Spec: spec,
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func testVolumeClaimAnnotation(name string, namespace string, ann string, annval string, spec core.PersistentVolumeClaimSpec) *core.PersistentVolumeClaim {
 | 
						|
	annotations := map[string]string{
 | 
						|
		ann: annval,
 | 
						|
	}
 | 
						|
 | 
						|
	return &core.PersistentVolumeClaim{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name:        name,
 | 
						|
			Namespace:   namespace,
 | 
						|
			Annotations: annotations,
 | 
						|
		},
 | 
						|
		Spec: spec,
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func testVolumeClaimStorageClassInSpec(name, namespace, scName string, spec core.PersistentVolumeClaimSpec) *core.PersistentVolumeClaim {
 | 
						|
	spec.StorageClassName = &scName
 | 
						|
	return &core.PersistentVolumeClaim{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name:      name,
 | 
						|
			Namespace: namespace,
 | 
						|
		},
 | 
						|
		Spec: spec,
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func testVolumeClaimStorageClassInAnnotationAndSpec(name, namespace, scNameInAnn, scName string, spec core.PersistentVolumeClaimSpec) *core.PersistentVolumeClaim {
 | 
						|
	spec.StorageClassName = &scName
 | 
						|
	return &core.PersistentVolumeClaim{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name:        name,
 | 
						|
			Namespace:   namespace,
 | 
						|
			Annotations: map[string]string{v1.BetaStorageClassAnnotation: scNameInAnn},
 | 
						|
		},
 | 
						|
		Spec: spec,
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidatePersistentVolumeClaim(t *testing.T) {
 | 
						|
	invalidClassName := "-invalid-"
 | 
						|
	validClassName := "valid"
 | 
						|
	validMode := core.PersistentVolumeFilesystem
 | 
						|
	scenarios := map[string]struct {
 | 
						|
		isExpectedFailure bool
 | 
						|
		claim             *core.PersistentVolumeClaim
 | 
						|
	}{
 | 
						|
		"good-claim": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			claim: testVolumeClaim("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
				Selector: &metav1.LabelSelector{
 | 
						|
					MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
						{
 | 
						|
							Key:      "key2",
 | 
						|
							Operator: "Exists",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
					core.ReadWriteOnce,
 | 
						|
					core.ReadOnlyMany,
 | 
						|
				},
 | 
						|
				Resources: core.ResourceRequirements{
 | 
						|
					Requests: core.ResourceList{
 | 
						|
						core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
				StorageClassName: &validClassName,
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"invalid-claim-zero-capacity": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			claim: testVolumeClaim("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
				Selector: &metav1.LabelSelector{
 | 
						|
					MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
						{
 | 
						|
							Key:      "key2",
 | 
						|
							Operator: "Exists",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
					core.ReadWriteOnce,
 | 
						|
					core.ReadOnlyMany,
 | 
						|
				},
 | 
						|
				Resources: core.ResourceRequirements{
 | 
						|
					Requests: core.ResourceList{
 | 
						|
						core.ResourceName(core.ResourceStorage): resource.MustParse("0G"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
				StorageClassName: &validClassName,
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"invalid-label-selector": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			claim: testVolumeClaim("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
				Selector: &metav1.LabelSelector{
 | 
						|
					MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
						{
 | 
						|
							Key:      "key2",
 | 
						|
							Operator: "InvalidOp",
 | 
						|
							Values:   []string{"value1", "value2"},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
					core.ReadWriteOnce,
 | 
						|
					core.ReadOnlyMany,
 | 
						|
				},
 | 
						|
				Resources: core.ResourceRequirements{
 | 
						|
					Requests: core.ResourceList{
 | 
						|
						core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"invalid-accessmode": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			claim: testVolumeClaim("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{"fakemode"},
 | 
						|
				Resources: core.ResourceRequirements{
 | 
						|
					Requests: core.ResourceList{
 | 
						|
						core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"missing-namespace": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			claim: testVolumeClaim("foo", "", core.PersistentVolumeClaimSpec{
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
					core.ReadWriteOnce,
 | 
						|
					core.ReadOnlyMany,
 | 
						|
				},
 | 
						|
				Resources: core.ResourceRequirements{
 | 
						|
					Requests: core.ResourceList{
 | 
						|
						core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"no-access-modes": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			claim: testVolumeClaim("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
				Resources: core.ResourceRequirements{
 | 
						|
					Requests: core.ResourceList{
 | 
						|
						core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"no-resource-requests": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			claim: testVolumeClaim("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
					core.ReadWriteOnce,
 | 
						|
				},
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"invalid-resource-requests": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			claim: testVolumeClaim("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
					core.ReadWriteOnce,
 | 
						|
				},
 | 
						|
				Resources: core.ResourceRequirements{
 | 
						|
					Requests: core.ResourceList{
 | 
						|
						core.ResourceName(core.ResourceMemory): resource.MustParse("10G"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"negative-storage-request": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			claim: testVolumeClaim("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
				Selector: &metav1.LabelSelector{
 | 
						|
					MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
						{
 | 
						|
							Key:      "key2",
 | 
						|
							Operator: "Exists",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
					core.ReadWriteOnce,
 | 
						|
					core.ReadOnlyMany,
 | 
						|
				},
 | 
						|
				Resources: core.ResourceRequirements{
 | 
						|
					Requests: core.ResourceList{
 | 
						|
						core.ResourceName(core.ResourceStorage): resource.MustParse("-10G"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"zero-storage-request": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			claim: testVolumeClaim("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
				Selector: &metav1.LabelSelector{
 | 
						|
					MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
						{
 | 
						|
							Key:      "key2",
 | 
						|
							Operator: "Exists",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
					core.ReadWriteOnce,
 | 
						|
					core.ReadOnlyMany,
 | 
						|
				},
 | 
						|
				Resources: core.ResourceRequirements{
 | 
						|
					Requests: core.ResourceList{
 | 
						|
						core.ResourceName(core.ResourceStorage): resource.MustParse("0G"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		"invalid-storage-class-name": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			claim: testVolumeClaim("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
				Selector: &metav1.LabelSelector{
 | 
						|
					MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
						{
 | 
						|
							Key:      "key2",
 | 
						|
							Operator: "Exists",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
					core.ReadWriteOnce,
 | 
						|
					core.ReadOnlyMany,
 | 
						|
				},
 | 
						|
				Resources: core.ResourceRequirements{
 | 
						|
					Requests: core.ResourceList{
 | 
						|
						core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
				StorageClassName: &invalidClassName,
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		// VolumeMode alpha feature disabled
 | 
						|
		// TODO: remove when no longer alpha
 | 
						|
		"disabled alpha valid volume mode": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			claim: testVolumeClaim("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
				Selector: &metav1.LabelSelector{
 | 
						|
					MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
						{
 | 
						|
							Key:      "key2",
 | 
						|
							Operator: "Exists",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
					core.ReadWriteOnce,
 | 
						|
					core.ReadOnlyMany,
 | 
						|
				},
 | 
						|
				Resources: core.ResourceRequirements{
 | 
						|
					Requests: core.ResourceList{
 | 
						|
						core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
				StorageClassName: &validClassName,
 | 
						|
				VolumeMode:       &validMode,
 | 
						|
			}),
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for name, scenario := range scenarios {
 | 
						|
		errs := ValidatePersistentVolumeClaim(scenario.claim)
 | 
						|
		if len(errs) == 0 && scenario.isExpectedFailure {
 | 
						|
			t.Errorf("Unexpected success for scenario: %s", name)
 | 
						|
		}
 | 
						|
		if len(errs) > 0 && !scenario.isExpectedFailure {
 | 
						|
			t.Errorf("Unexpected failure for scenario: %s - %+v", name, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestAlphaPVVolumeModeUpdate(t *testing.T) {
 | 
						|
	block := core.PersistentVolumeBlock
 | 
						|
	file := core.PersistentVolumeFilesystem
 | 
						|
 | 
						|
	scenarios := map[string]struct {
 | 
						|
		isExpectedFailure bool
 | 
						|
		oldPV             *core.PersistentVolume
 | 
						|
		newPV             *core.PersistentVolume
 | 
						|
		enableBlock       bool
 | 
						|
	}{
 | 
						|
		"valid-update-volume-mode-block-to-block": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			oldPV:             createTestVolModePV(&block),
 | 
						|
			newPV:             createTestVolModePV(&block),
 | 
						|
			enableBlock:       true,
 | 
						|
		},
 | 
						|
		"valid-update-volume-mode-file-to-file": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			oldPV:             createTestVolModePV(&file),
 | 
						|
			newPV:             createTestVolModePV(&file),
 | 
						|
			enableBlock:       true,
 | 
						|
		},
 | 
						|
		"invalid-update-volume-mode-to-block": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldPV:             createTestVolModePV(&file),
 | 
						|
			newPV:             createTestVolModePV(&block),
 | 
						|
			enableBlock:       true,
 | 
						|
		},
 | 
						|
		"invalid-update-volume-mode-to-file": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldPV:             createTestVolModePV(&block),
 | 
						|
			newPV:             createTestVolModePV(&file),
 | 
						|
			enableBlock:       true,
 | 
						|
		},
 | 
						|
		"invalid-update-blocksupport-disabled": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldPV:             createTestVolModePV(&block),
 | 
						|
			newPV:             createTestVolModePV(&block),
 | 
						|
			enableBlock:       false,
 | 
						|
		},
 | 
						|
		"invalid-update-volume-mode-nil-to-file": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldPV:             createTestVolModePV(nil),
 | 
						|
			newPV:             createTestVolModePV(&file),
 | 
						|
			enableBlock:       true,
 | 
						|
		},
 | 
						|
		"invalid-update-volume-mode-nil-to-block": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldPV:             createTestVolModePV(nil),
 | 
						|
			newPV:             createTestVolModePV(&block),
 | 
						|
			enableBlock:       true,
 | 
						|
		},
 | 
						|
		"invalid-update-volume-mode-file-to-nil": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldPV:             createTestVolModePV(&file),
 | 
						|
			newPV:             createTestVolModePV(nil),
 | 
						|
			enableBlock:       true,
 | 
						|
		},
 | 
						|
		"invalid-update-volume-mode-block-to-nil": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldPV:             createTestVolModePV(&block),
 | 
						|
			newPV:             createTestVolModePV(nil),
 | 
						|
			enableBlock:       true,
 | 
						|
		},
 | 
						|
		"invalid-update-volume-mode-nil-to-nil": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			oldPV:             createTestVolModePV(nil),
 | 
						|
			newPV:             createTestVolModePV(nil),
 | 
						|
			enableBlock:       true,
 | 
						|
		},
 | 
						|
		"invalid-update-volume-mode-empty-to-mode": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldPV:             createTestPV(),
 | 
						|
			newPV:             createTestVolModePV(&block),
 | 
						|
			enableBlock:       true,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for name, scenario := range scenarios {
 | 
						|
		// ensure we have a resource version specified for updates
 | 
						|
		toggleBlockVolumeFeature(scenario.enableBlock, t)
 | 
						|
		errs := ValidatePersistentVolumeUpdate(scenario.newPV, scenario.oldPV)
 | 
						|
		if len(errs) == 0 && scenario.isExpectedFailure {
 | 
						|
			t.Errorf("Unexpected success for scenario: %s", name)
 | 
						|
		}
 | 
						|
		if len(errs) > 0 && !scenario.isExpectedFailure {
 | 
						|
			t.Errorf("Unexpected failure for scenario: %s - %+v", name, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidatePersistentVolumeClaimUpdate(t *testing.T) {
 | 
						|
	block := core.PersistentVolumeBlock
 | 
						|
	file := core.PersistentVolumeFilesystem
 | 
						|
 | 
						|
	validClaim := testVolumeClaimWithStatus("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
		AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
			core.ReadWriteOnce,
 | 
						|
			core.ReadOnlyMany,
 | 
						|
		},
 | 
						|
		Resources: core.ResourceRequirements{
 | 
						|
			Requests: core.ResourceList{
 | 
						|
				core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}, core.PersistentVolumeClaimStatus{
 | 
						|
		Phase: core.ClaimBound,
 | 
						|
	})
 | 
						|
 | 
						|
	validClaimStorageClass := testVolumeClaimStorageClass("foo", "ns", "fast", core.PersistentVolumeClaimSpec{
 | 
						|
		AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
			core.ReadOnlyMany,
 | 
						|
		},
 | 
						|
		Resources: core.ResourceRequirements{
 | 
						|
			Requests: core.ResourceList{
 | 
						|
				core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
			},
 | 
						|
		},
 | 
						|
	})
 | 
						|
	validClaimAnnotation := testVolumeClaimAnnotation("foo", "ns", "description", "foo-description", core.PersistentVolumeClaimSpec{
 | 
						|
		AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
			core.ReadOnlyMany,
 | 
						|
		},
 | 
						|
		Resources: core.ResourceRequirements{
 | 
						|
			Requests: core.ResourceList{
 | 
						|
				core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
			},
 | 
						|
		},
 | 
						|
	})
 | 
						|
	validUpdateClaim := testVolumeClaim("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
		AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
			core.ReadWriteOnce,
 | 
						|
			core.ReadOnlyMany,
 | 
						|
		},
 | 
						|
		Resources: core.ResourceRequirements{
 | 
						|
			Requests: core.ResourceList{
 | 
						|
				core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		VolumeName: "volume",
 | 
						|
	})
 | 
						|
	invalidUpdateClaimResources := testVolumeClaim("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
		AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
			core.ReadWriteOnce,
 | 
						|
			core.ReadOnlyMany,
 | 
						|
		},
 | 
						|
		Resources: core.ResourceRequirements{
 | 
						|
			Requests: core.ResourceList{
 | 
						|
				core.ResourceName(core.ResourceStorage): resource.MustParse("20G"),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		VolumeName: "volume",
 | 
						|
	})
 | 
						|
	invalidUpdateClaimAccessModes := testVolumeClaim("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
		AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
			core.ReadWriteOnce,
 | 
						|
		},
 | 
						|
		Resources: core.ResourceRequirements{
 | 
						|
			Requests: core.ResourceList{
 | 
						|
				core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		VolumeName: "volume",
 | 
						|
	})
 | 
						|
	validClaimVolumeModeFile := testVolumeClaim("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
		AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
			core.ReadWriteOnce,
 | 
						|
		},
 | 
						|
		VolumeMode: &file,
 | 
						|
		Resources: core.ResourceRequirements{
 | 
						|
			Requests: core.ResourceList{
 | 
						|
				core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		VolumeName: "volume",
 | 
						|
	})
 | 
						|
	validClaimVolumeModeBlock := testVolumeClaim("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
		AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
			core.ReadWriteOnce,
 | 
						|
		},
 | 
						|
		VolumeMode: &block,
 | 
						|
		Resources: core.ResourceRequirements{
 | 
						|
			Requests: core.ResourceList{
 | 
						|
				core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		VolumeName: "volume",
 | 
						|
	})
 | 
						|
	invalidClaimVolumeModeNil := testVolumeClaim("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
		AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
			core.ReadWriteOnce,
 | 
						|
		},
 | 
						|
		VolumeMode: nil,
 | 
						|
		Resources: core.ResourceRequirements{
 | 
						|
			Requests: core.ResourceList{
 | 
						|
				core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		VolumeName: "volume",
 | 
						|
	})
 | 
						|
	invalidUpdateClaimStorageClass := testVolumeClaimStorageClass("foo", "ns", "fast2", core.PersistentVolumeClaimSpec{
 | 
						|
		AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
			core.ReadOnlyMany,
 | 
						|
		},
 | 
						|
		Resources: core.ResourceRequirements{
 | 
						|
			Requests: core.ResourceList{
 | 
						|
				core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		VolumeName: "volume",
 | 
						|
	})
 | 
						|
	validUpdateClaimMutableAnnotation := testVolumeClaimAnnotation("foo", "ns", "description", "updated-or-added-foo-description", core.PersistentVolumeClaimSpec{
 | 
						|
		AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
			core.ReadOnlyMany,
 | 
						|
		},
 | 
						|
		Resources: core.ResourceRequirements{
 | 
						|
			Requests: core.ResourceList{
 | 
						|
				core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		VolumeName: "volume",
 | 
						|
	})
 | 
						|
	validAddClaimAnnotation := testVolumeClaimAnnotation("foo", "ns", "description", "updated-or-added-foo-description", core.PersistentVolumeClaimSpec{
 | 
						|
		AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
			core.ReadWriteOnce,
 | 
						|
			core.ReadOnlyMany,
 | 
						|
		},
 | 
						|
		Resources: core.ResourceRequirements{
 | 
						|
			Requests: core.ResourceList{
 | 
						|
				core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		VolumeName: "volume",
 | 
						|
	})
 | 
						|
	validSizeUpdate := testVolumeClaimWithStatus("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
		AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
			core.ReadWriteOnce,
 | 
						|
			core.ReadOnlyMany,
 | 
						|
		},
 | 
						|
		Resources: core.ResourceRequirements{
 | 
						|
			Requests: core.ResourceList{
 | 
						|
				core.ResourceName(core.ResourceStorage): resource.MustParse("15G"),
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}, core.PersistentVolumeClaimStatus{
 | 
						|
		Phase: core.ClaimBound,
 | 
						|
	})
 | 
						|
 | 
						|
	invalidSizeUpdate := testVolumeClaimWithStatus("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
		AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
			core.ReadWriteOnce,
 | 
						|
			core.ReadOnlyMany,
 | 
						|
		},
 | 
						|
		Resources: core.ResourceRequirements{
 | 
						|
			Requests: core.ResourceList{
 | 
						|
				core.ResourceName(core.ResourceStorage): resource.MustParse("5G"),
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}, core.PersistentVolumeClaimStatus{
 | 
						|
		Phase: core.ClaimBound,
 | 
						|
	})
 | 
						|
 | 
						|
	unboundSizeUpdate := testVolumeClaimWithStatus("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
		AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
			core.ReadWriteOnce,
 | 
						|
			core.ReadOnlyMany,
 | 
						|
		},
 | 
						|
		Resources: core.ResourceRequirements{
 | 
						|
			Requests: core.ResourceList{
 | 
						|
				core.ResourceName(core.ResourceStorage): resource.MustParse("12G"),
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}, core.PersistentVolumeClaimStatus{
 | 
						|
		Phase: core.ClaimPending,
 | 
						|
	})
 | 
						|
 | 
						|
	validClaimStorageClassInSpec := testVolumeClaimStorageClassInSpec("foo", "ns", "fast", core.PersistentVolumeClaimSpec{
 | 
						|
		AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
			core.ReadOnlyMany,
 | 
						|
		},
 | 
						|
		Resources: core.ResourceRequirements{
 | 
						|
			Requests: core.ResourceList{
 | 
						|
				core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
			},
 | 
						|
		},
 | 
						|
	})
 | 
						|
 | 
						|
	invalidClaimStorageClassInSpec := testVolumeClaimStorageClassInSpec("foo", "ns", "fast2", core.PersistentVolumeClaimSpec{
 | 
						|
		AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
			core.ReadOnlyMany,
 | 
						|
		},
 | 
						|
		Resources: core.ResourceRequirements{
 | 
						|
			Requests: core.ResourceList{
 | 
						|
				core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
			},
 | 
						|
		},
 | 
						|
	})
 | 
						|
 | 
						|
	validClaimStorageClassInAnnotationAndSpec := testVolumeClaimStorageClassInAnnotationAndSpec(
 | 
						|
		"foo", "ns", "fast", "fast", core.PersistentVolumeClaimSpec{
 | 
						|
			AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
				core.ReadOnlyMany,
 | 
						|
			},
 | 
						|
			Resources: core.ResourceRequirements{
 | 
						|
				Requests: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		})
 | 
						|
 | 
						|
	invalidClaimStorageClassInAnnotationAndSpec := testVolumeClaimStorageClassInAnnotationAndSpec(
 | 
						|
		"foo", "ns", "fast2", "fast", core.PersistentVolumeClaimSpec{
 | 
						|
			AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
				core.ReadOnlyMany,
 | 
						|
			},
 | 
						|
			Resources: core.ResourceRequirements{
 | 
						|
				Requests: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		})
 | 
						|
 | 
						|
	scenarios := map[string]struct {
 | 
						|
		isExpectedFailure bool
 | 
						|
		oldClaim          *core.PersistentVolumeClaim
 | 
						|
		newClaim          *core.PersistentVolumeClaim
 | 
						|
		enableResize      bool
 | 
						|
		enableBlock       bool
 | 
						|
	}{
 | 
						|
		"valid-update-volumeName-only": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			oldClaim:          validClaim,
 | 
						|
			newClaim:          validUpdateClaim,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       false,
 | 
						|
		},
 | 
						|
		"valid-no-op-update": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			oldClaim:          validUpdateClaim,
 | 
						|
			newClaim:          validUpdateClaim,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       false,
 | 
						|
		},
 | 
						|
		"invalid-update-change-resources-on-bound-claim": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldClaim:          validUpdateClaim,
 | 
						|
			newClaim:          invalidUpdateClaimResources,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       false,
 | 
						|
		},
 | 
						|
		"invalid-update-change-access-modes-on-bound-claim": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldClaim:          validUpdateClaim,
 | 
						|
			newClaim:          invalidUpdateClaimAccessModes,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       false,
 | 
						|
		},
 | 
						|
		"valid-update-volume-mode-block-to-block": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			oldClaim:          validClaimVolumeModeBlock,
 | 
						|
			newClaim:          validClaimVolumeModeBlock,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       true,
 | 
						|
		},
 | 
						|
		"valid-update-volume-mode-file-to-file": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			oldClaim:          validClaimVolumeModeFile,
 | 
						|
			newClaim:          validClaimVolumeModeFile,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       true,
 | 
						|
		},
 | 
						|
		"invalid-update-volume-mode-to-block": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldClaim:          validClaimVolumeModeFile,
 | 
						|
			newClaim:          validClaimVolumeModeBlock,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       true,
 | 
						|
		},
 | 
						|
		"invalid-update-volume-mode-to-file": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldClaim:          validClaimVolumeModeBlock,
 | 
						|
			newClaim:          validClaimVolumeModeFile,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       true,
 | 
						|
		},
 | 
						|
		"invalid-update-volume-mode-nil-to-file": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldClaim:          invalidClaimVolumeModeNil,
 | 
						|
			newClaim:          validClaimVolumeModeFile,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       true,
 | 
						|
		},
 | 
						|
		"invalid-update-volume-mode-nil-to-block": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldClaim:          invalidClaimVolumeModeNil,
 | 
						|
			newClaim:          validClaimVolumeModeBlock,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       true,
 | 
						|
		},
 | 
						|
		"invalid-update-volume-mode-block-to-nil": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldClaim:          validClaimVolumeModeBlock,
 | 
						|
			newClaim:          invalidClaimVolumeModeNil,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       true,
 | 
						|
		},
 | 
						|
		"invalid-update-volume-mode-file-to-nil": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldClaim:          validClaimVolumeModeFile,
 | 
						|
			newClaim:          invalidClaimVolumeModeNil,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       true,
 | 
						|
		},
 | 
						|
		"invalid-update-volume-mode-empty-to-mode": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldClaim:          validClaim,
 | 
						|
			newClaim:          validClaimVolumeModeBlock,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       true,
 | 
						|
		},
 | 
						|
		"invalid-update-volume-mode-mode-to-empty": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldClaim:          validClaimVolumeModeBlock,
 | 
						|
			newClaim:          validClaim,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       true,
 | 
						|
		},
 | 
						|
		"invalid-update-blocksupport-disabled": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldClaim:          validClaimVolumeModeFile,
 | 
						|
			newClaim:          validClaimVolumeModeFile,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       false,
 | 
						|
		},
 | 
						|
		"invalid-update-change-storage-class-annotation-after-creation": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldClaim:          validClaimStorageClass,
 | 
						|
			newClaim:          invalidUpdateClaimStorageClass,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       false,
 | 
						|
		},
 | 
						|
		"valid-update-mutable-annotation": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			oldClaim:          validClaimAnnotation,
 | 
						|
			newClaim:          validUpdateClaimMutableAnnotation,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       false,
 | 
						|
		},
 | 
						|
		"valid-update-add-annotation": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			oldClaim:          validClaim,
 | 
						|
			newClaim:          validAddClaimAnnotation,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       false,
 | 
						|
		},
 | 
						|
		"valid-size-update-resize-disabled": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldClaim:          validClaim,
 | 
						|
			newClaim:          validSizeUpdate,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       false,
 | 
						|
		},
 | 
						|
		"valid-size-update-resize-enabled": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			oldClaim:          validClaim,
 | 
						|
			newClaim:          validSizeUpdate,
 | 
						|
			enableResize:      true,
 | 
						|
			enableBlock:       false,
 | 
						|
		},
 | 
						|
		"invalid-size-update-resize-enabled": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldClaim:          validClaim,
 | 
						|
			newClaim:          invalidSizeUpdate,
 | 
						|
			enableResize:      true,
 | 
						|
			enableBlock:       false,
 | 
						|
		},
 | 
						|
		"unbound-size-update-resize-enabled": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldClaim:          validClaim,
 | 
						|
			newClaim:          unboundSizeUpdate,
 | 
						|
			enableResize:      true,
 | 
						|
			enableBlock:       false,
 | 
						|
		},
 | 
						|
		"valid-upgrade-storage-class-annotation-to-spec": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			oldClaim:          validClaimStorageClass,
 | 
						|
			newClaim:          validClaimStorageClassInSpec,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       false,
 | 
						|
		},
 | 
						|
		"invalid-upgrade-storage-class-annotation-to-spec": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldClaim:          validClaimStorageClass,
 | 
						|
			newClaim:          invalidClaimStorageClassInSpec,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       false,
 | 
						|
		},
 | 
						|
		"valid-upgrade-storage-class-annotation-to-annotation-and-spec": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			oldClaim:          validClaimStorageClass,
 | 
						|
			newClaim:          validClaimStorageClassInAnnotationAndSpec,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       false,
 | 
						|
		},
 | 
						|
		"invalid-upgrade-storage-class-annotation-to-annotation-and-spec": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldClaim:          validClaimStorageClass,
 | 
						|
			newClaim:          invalidClaimStorageClassInAnnotationAndSpec,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       false,
 | 
						|
		},
 | 
						|
		"invalid-upgrade-storage-class-in-spec": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldClaim:          validClaimStorageClassInSpec,
 | 
						|
			newClaim:          invalidClaimStorageClassInSpec,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       false,
 | 
						|
		},
 | 
						|
		"invalid-downgrade-storage-class-spec-to-annotation": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldClaim:          validClaimStorageClassInSpec,
 | 
						|
			newClaim:          validClaimStorageClass,
 | 
						|
			enableResize:      false,
 | 
						|
			enableBlock:       false,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for name, scenario := range scenarios {
 | 
						|
		// ensure we have a resource version specified for updates
 | 
						|
		togglePVExpandFeature(scenario.enableResize, t)
 | 
						|
		toggleBlockVolumeFeature(scenario.enableBlock, t)
 | 
						|
		scenario.oldClaim.ResourceVersion = "1"
 | 
						|
		scenario.newClaim.ResourceVersion = "1"
 | 
						|
		errs := ValidatePersistentVolumeClaimUpdate(scenario.newClaim, scenario.oldClaim)
 | 
						|
		if len(errs) == 0 && scenario.isExpectedFailure {
 | 
						|
			t.Errorf("Unexpected success for scenario: %s", name)
 | 
						|
		}
 | 
						|
		if len(errs) > 0 && !scenario.isExpectedFailure {
 | 
						|
			t.Errorf("Unexpected failure for scenario: %s - %+v", name, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func toggleBlockVolumeFeature(toggleFlag bool, t *testing.T) {
 | 
						|
	if toggleFlag {
 | 
						|
		// Enable alpha feature BlockVolume
 | 
						|
		err := utilfeature.DefaultFeatureGate.Set("BlockVolume=true")
 | 
						|
		if err != nil {
 | 
						|
			t.Errorf("Failed to enable feature gate for BlockVolume: %v", err)
 | 
						|
			return
 | 
						|
		}
 | 
						|
	} else {
 | 
						|
		err := utilfeature.DefaultFeatureGate.Set("BlockVolume=false")
 | 
						|
		if err != nil {
 | 
						|
			t.Errorf("Failed to disable feature gate for BlockVolume: %v", err)
 | 
						|
			return
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func togglePVExpandFeature(toggleFlag bool, t *testing.T) {
 | 
						|
	if toggleFlag {
 | 
						|
		// Enable alpha feature LocalStorageCapacityIsolation
 | 
						|
		err := utilfeature.DefaultFeatureGate.Set("ExpandPersistentVolumes=true")
 | 
						|
		if err != nil {
 | 
						|
			t.Errorf("Failed to enable feature gate for ExpandPersistentVolumes: %v", err)
 | 
						|
			return
 | 
						|
		}
 | 
						|
	} else {
 | 
						|
		err := utilfeature.DefaultFeatureGate.Set("ExpandPersistentVolumes=false")
 | 
						|
		if err != nil {
 | 
						|
			t.Errorf("Failed to disable feature gate for ExpandPersistentVolumes: %v", err)
 | 
						|
			return
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateKeyToPath(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		kp      core.KeyToPath
 | 
						|
		ok      bool
 | 
						|
		errtype field.ErrorType
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			kp: core.KeyToPath{Key: "k", Path: "p"},
 | 
						|
			ok: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			kp: core.KeyToPath{Key: "k", Path: "p/p/p/p"},
 | 
						|
			ok: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			kp: core.KeyToPath{Key: "k", Path: "p/..p/p../p..p"},
 | 
						|
			ok: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			kp: core.KeyToPath{Key: "k", Path: "p", Mode: utilpointer.Int32Ptr(0644)},
 | 
						|
			ok: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			kp:      core.KeyToPath{Key: "", Path: "p"},
 | 
						|
			ok:      false,
 | 
						|
			errtype: field.ErrorTypeRequired,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			kp:      core.KeyToPath{Key: "k", Path: ""},
 | 
						|
			ok:      false,
 | 
						|
			errtype: field.ErrorTypeRequired,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			kp:      core.KeyToPath{Key: "k", Path: "..p"},
 | 
						|
			ok:      false,
 | 
						|
			errtype: field.ErrorTypeInvalid,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			kp:      core.KeyToPath{Key: "k", Path: "../p"},
 | 
						|
			ok:      false,
 | 
						|
			errtype: field.ErrorTypeInvalid,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			kp:      core.KeyToPath{Key: "k", Path: "p/../p"},
 | 
						|
			ok:      false,
 | 
						|
			errtype: field.ErrorTypeInvalid,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			kp:      core.KeyToPath{Key: "k", Path: "p/.."},
 | 
						|
			ok:      false,
 | 
						|
			errtype: field.ErrorTypeInvalid,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			kp:      core.KeyToPath{Key: "k", Path: "p", Mode: utilpointer.Int32Ptr(01000)},
 | 
						|
			ok:      false,
 | 
						|
			errtype: field.ErrorTypeInvalid,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			kp:      core.KeyToPath{Key: "k", Path: "p", Mode: utilpointer.Int32Ptr(-1)},
 | 
						|
			ok:      false,
 | 
						|
			errtype: field.ErrorTypeInvalid,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for i, tc := range testCases {
 | 
						|
		errs := validateKeyToPath(&tc.kp, field.NewPath("field"))
 | 
						|
		if tc.ok && len(errs) > 0 {
 | 
						|
			t.Errorf("[%d] unexpected errors: %v", i, errs)
 | 
						|
		} else if !tc.ok && len(errs) == 0 {
 | 
						|
			t.Errorf("[%d] expected error type %v", i, tc.errtype)
 | 
						|
		} else if len(errs) > 1 {
 | 
						|
			t.Errorf("[%d] expected only one error, got %d", i, len(errs))
 | 
						|
		} else if !tc.ok {
 | 
						|
			if errs[0].Type != tc.errtype {
 | 
						|
				t.Errorf("[%d] expected error type %v, got %v", i, tc.errtype, errs[0].Type)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateNFSVolumeSource(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		name      string
 | 
						|
		nfs       *core.NFSVolumeSource
 | 
						|
		errtype   field.ErrorType
 | 
						|
		errfield  string
 | 
						|
		errdetail string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name:     "missing server",
 | 
						|
			nfs:      &core.NFSVolumeSource{Server: "", Path: "/tmp"},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "server",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:     "missing path",
 | 
						|
			nfs:      &core.NFSVolumeSource{Server: "my-server", Path: ""},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "path",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:      "abs path",
 | 
						|
			nfs:       &core.NFSVolumeSource{Server: "my-server", Path: "tmp"},
 | 
						|
			errtype:   field.ErrorTypeInvalid,
 | 
						|
			errfield:  "path",
 | 
						|
			errdetail: "must be an absolute path",
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for i, tc := range testCases {
 | 
						|
		errs := validateNFSVolumeSource(tc.nfs, field.NewPath("field"))
 | 
						|
 | 
						|
		if len(errs) > 0 && tc.errtype == "" {
 | 
						|
			t.Errorf("[%d: %q] unexpected error(s): %v", i, tc.name, errs)
 | 
						|
		} else if len(errs) == 0 && tc.errtype != "" {
 | 
						|
			t.Errorf("[%d: %q] expected error type %v", i, tc.name, tc.errtype)
 | 
						|
		} else if len(errs) >= 1 {
 | 
						|
			if errs[0].Type != tc.errtype {
 | 
						|
				t.Errorf("[%d: %q] expected error type %v, got %v", i, tc.name, tc.errtype, errs[0].Type)
 | 
						|
			} else if !strings.HasSuffix(errs[0].Field, "."+tc.errfield) {
 | 
						|
				t.Errorf("[%d: %q] expected error on field %q, got %q", i, tc.name, tc.errfield, errs[0].Field)
 | 
						|
			} else if !strings.Contains(errs[0].Detail, tc.errdetail) {
 | 
						|
				t.Errorf("[%d: %q] expected error detail %q, got %q", i, tc.name, tc.errdetail, errs[0].Detail)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateGlusterfs(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		name     string
 | 
						|
		gfs      *core.GlusterfsVolumeSource
 | 
						|
		errtype  field.ErrorType
 | 
						|
		errfield string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name:     "missing endpointname",
 | 
						|
			gfs:      &core.GlusterfsVolumeSource{EndpointsName: "", Path: "/tmp"},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "endpoints",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:     "missing path",
 | 
						|
			gfs:      &core.GlusterfsVolumeSource{EndpointsName: "my-endpoint", Path: ""},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "path",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:     "missing endpintname and path",
 | 
						|
			gfs:      &core.GlusterfsVolumeSource{EndpointsName: "", Path: ""},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "endpoints",
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for i, tc := range testCases {
 | 
						|
		errs := validateGlusterfsVolumeSource(tc.gfs, field.NewPath("field"))
 | 
						|
 | 
						|
		if len(errs) > 0 && tc.errtype == "" {
 | 
						|
			t.Errorf("[%d: %q] unexpected error(s): %v", i, tc.name, errs)
 | 
						|
		} else if len(errs) == 0 && tc.errtype != "" {
 | 
						|
			t.Errorf("[%d: %q] expected error type %v", i, tc.name, tc.errtype)
 | 
						|
		} else if len(errs) >= 1 {
 | 
						|
			if errs[0].Type != tc.errtype {
 | 
						|
				t.Errorf("[%d: %q] expected error type %v, got %v", i, tc.name, tc.errtype, errs[0].Type)
 | 
						|
			} else if !strings.HasSuffix(errs[0].Field, "."+tc.errfield) {
 | 
						|
				t.Errorf("[%d: %q] expected error on field %q, got %q", i, tc.name, tc.errfield, errs[0].Field)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateCSIVolumeSource(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		name     string
 | 
						|
		csi      *core.CSIPersistentVolumeSource
 | 
						|
		errtype  field.ErrorType
 | 
						|
		errfield string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name: "all required fields ok",
 | 
						|
			csi:  &core.CSIPersistentVolumeSource{Driver: "test-driver", VolumeHandle: "test-123", ReadOnly: true},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "with default values ok",
 | 
						|
			csi:  &core.CSIPersistentVolumeSource{Driver: "test-driver", VolumeHandle: "test-123"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:     "missing driver name",
 | 
						|
			csi:      &core.CSIPersistentVolumeSource{VolumeHandle: "test-123"},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "driver",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:     "missing volume handle",
 | 
						|
			csi:      &core.CSIPersistentVolumeSource{Driver: "my-driver"},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "volumeHandle",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "driver name: ok no punctuations",
 | 
						|
			csi:  &core.CSIPersistentVolumeSource{Driver: "comgooglestoragecsigcepd", VolumeHandle: "test-123"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "driver name: ok dot only",
 | 
						|
			csi:  &core.CSIPersistentVolumeSource{Driver: "io.kubernetes.storage.csi.flex", VolumeHandle: "test-123"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "driver name: ok dash only",
 | 
						|
			csi:  &core.CSIPersistentVolumeSource{Driver: "io-kubernetes-storage-csi-flex", VolumeHandle: "test-123"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "driver name: ok underscore only",
 | 
						|
			csi:  &core.CSIPersistentVolumeSource{Driver: "io_kubernetes_storage_csi_flex", VolumeHandle: "test-123"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "driver name: ok dot underscores",
 | 
						|
			csi:  &core.CSIPersistentVolumeSource{Driver: "io.kubernetes.storage_csi.flex", VolumeHandle: "test-123"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "driver name: ok beginnin with number",
 | 
						|
			csi:  &core.CSIPersistentVolumeSource{Driver: "2io.kubernetes.storage_csi.flex", VolumeHandle: "test-123"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "driver name: ok ending with number",
 | 
						|
			csi:  &core.CSIPersistentVolumeSource{Driver: "io.kubernetes.storage_csi.flex2", VolumeHandle: "test-123"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "driver name: ok dot dash underscores",
 | 
						|
			csi:  &core.CSIPersistentVolumeSource{Driver: "io.kubernetes-storage.csi_flex", VolumeHandle: "test-123"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:     "driver name: invalid length 0",
 | 
						|
			csi:      &core.CSIPersistentVolumeSource{Driver: "", VolumeHandle: "test-123"},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "driver",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:     "driver name: invalid length 1",
 | 
						|
			csi:      &core.CSIPersistentVolumeSource{Driver: "a", VolumeHandle: "test-123"},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "driver",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:     "driver name: invalid length > 63",
 | 
						|
			csi:      &core.CSIPersistentVolumeSource{Driver: "comgooglestoragecsigcepdcomgooglestoragecsigcepdcomgooglestoragecsigcepdcomgooglestoragecsigcepd", VolumeHandle: "test-123"},
 | 
						|
			errtype:  field.ErrorTypeTooLong,
 | 
						|
			errfield: "driver",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:     "driver name: invalid start char",
 | 
						|
			csi:      &core.CSIPersistentVolumeSource{Driver: "_comgooglestoragecsigcepd", VolumeHandle: "test-123"},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "driver",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:     "driver name: invalid end char",
 | 
						|
			csi:      &core.CSIPersistentVolumeSource{Driver: "comgooglestoragecsigcepd/", VolumeHandle: "test-123"},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "driver",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:     "driver name: invalid separators",
 | 
						|
			csi:      &core.CSIPersistentVolumeSource{Driver: "com/google/storage/csi~gcepd", VolumeHandle: "test-123"},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "driver",
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	err := utilfeature.DefaultFeatureGate.Set("CSIPersistentVolume=true")
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("Failed to enable feature gate for CSIPersistentVolumes: %v", err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	for i, tc := range testCases {
 | 
						|
		errs := validateCSIPersistentVolumeSource(tc.csi, field.NewPath("field"))
 | 
						|
 | 
						|
		if len(errs) > 0 && tc.errtype == "" {
 | 
						|
			t.Errorf("[%d: %q] unexpected error(s): %v", i, tc.name, errs)
 | 
						|
		} else if len(errs) == 0 && tc.errtype != "" {
 | 
						|
			t.Errorf("[%d: %q] expected error type %v", i, tc.name, tc.errtype)
 | 
						|
		} else if len(errs) >= 1 {
 | 
						|
			if errs[0].Type != tc.errtype {
 | 
						|
				t.Errorf("[%d: %q] expected error type %v, got %v", i, tc.name, tc.errtype, errs[0].Type)
 | 
						|
			} else if !strings.HasSuffix(errs[0].Field, "."+tc.errfield) {
 | 
						|
				t.Errorf("[%d: %q] expected error on field %q, got %q", i, tc.name, tc.errfield, errs[0].Field)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	err = utilfeature.DefaultFeatureGate.Set("CSIPersistentVolume=false")
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("Failed to disable feature gate for CSIPersistentVolumes: %v", err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// This test is a little too top-to-bottom.  Ideally we would test each volume
 | 
						|
// type on its own, but we want to also make sure that the logic works through
 | 
						|
// the one-of wrapper, so we just do it all in one place.
 | 
						|
func TestValidateVolumes(t *testing.T) {
 | 
						|
	validInitiatorName := "iqn.2015-02.example.com:init"
 | 
						|
	invalidInitiatorName := "2015-02.example.com:init"
 | 
						|
	testCases := []struct {
 | 
						|
		name      string
 | 
						|
		vol       core.Volume
 | 
						|
		errtype   field.ErrorType
 | 
						|
		errfield  string
 | 
						|
		errdetail string
 | 
						|
	}{
 | 
						|
		// EmptyDir and basic volume names
 | 
						|
		{
 | 
						|
			name: "valid alpha name",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "empty",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					EmptyDir: &core.EmptyDirVolumeSource{},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid num name",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "123",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					EmptyDir: &core.EmptyDirVolumeSource{},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid alphanum name",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "empty-123",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					EmptyDir: &core.EmptyDirVolumeSource{},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid numalpha name",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "123-empty",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					EmptyDir: &core.EmptyDirVolumeSource{},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "zero-length name",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name:         "",
 | 
						|
				VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "name",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "name > 63 characters",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name:         strings.Repeat("a", 64),
 | 
						|
				VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}},
 | 
						|
			},
 | 
						|
			errtype:   field.ErrorTypeInvalid,
 | 
						|
			errfield:  "name",
 | 
						|
			errdetail: "must be no more than",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "name not a DNS label",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name:         "a.b.c",
 | 
						|
				VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}},
 | 
						|
			},
 | 
						|
			errtype:   field.ErrorTypeInvalid,
 | 
						|
			errfield:  "name",
 | 
						|
			errdetail: dnsLabelErrMsg,
 | 
						|
		},
 | 
						|
		// More than one source field specified.
 | 
						|
		{
 | 
						|
			name: "more than one source",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "dups",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					EmptyDir: &core.EmptyDirVolumeSource{},
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/mnt/path",
 | 
						|
						Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:   field.ErrorTypeForbidden,
 | 
						|
			errfield:  "hostPath",
 | 
						|
			errdetail: "may not specify more than 1 volume",
 | 
						|
		},
 | 
						|
		// HostPath Default
 | 
						|
		{
 | 
						|
			name: "default HostPath",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "hostpath",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/mnt/path",
 | 
						|
						Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// HostPath Supported
 | 
						|
		{
 | 
						|
			name: "valid HostPath",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "hostpath",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/mnt/path",
 | 
						|
						Type: newHostPathType(string(core.HostPathSocket)),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// HostPath Invalid
 | 
						|
		{
 | 
						|
			name: "invalid HostPath",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "hostpath",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/mnt/path",
 | 
						|
						Type: newHostPathType("invalid"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeNotSupported,
 | 
						|
			errfield: "type",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid HostPath backsteps",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "hostpath",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					HostPath: &core.HostPathVolumeSource{
 | 
						|
						Path: "/mnt/path/..",
 | 
						|
						Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:   field.ErrorTypeInvalid,
 | 
						|
			errfield:  "path",
 | 
						|
			errdetail: "must not contain '..'",
 | 
						|
		},
 | 
						|
		// GcePersistentDisk
 | 
						|
		{
 | 
						|
			name: "valid GcePersistentDisk",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "gce-pd",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					GCEPersistentDisk: &core.GCEPersistentDiskVolumeSource{
 | 
						|
						PDName:    "my-PD",
 | 
						|
						FSType:    "ext4",
 | 
						|
						Partition: 1,
 | 
						|
						ReadOnly:  false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// AWSElasticBlockStore
 | 
						|
		{
 | 
						|
			name: "valid AWSElasticBlockStore",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "aws-ebs",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					AWSElasticBlockStore: &core.AWSElasticBlockStoreVolumeSource{
 | 
						|
						VolumeID:  "my-PD",
 | 
						|
						FSType:    "ext4",
 | 
						|
						Partition: 1,
 | 
						|
						ReadOnly:  false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// GitRepo
 | 
						|
		{
 | 
						|
			name: "valid GitRepo",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "git-repo",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					GitRepo: &core.GitRepoVolumeSource{
 | 
						|
						Repository: "my-repo",
 | 
						|
						Revision:   "hashstring",
 | 
						|
						Directory:  "target",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid GitRepo in .",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "git-repo-dot",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					GitRepo: &core.GitRepoVolumeSource{
 | 
						|
						Repository: "my-repo",
 | 
						|
						Directory:  ".",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid GitRepo with .. in name",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "git-repo-dot-dot-foo",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					GitRepo: &core.GitRepoVolumeSource{
 | 
						|
						Repository: "my-repo",
 | 
						|
						Directory:  "..foo",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "GitRepo starts with ../",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "gitrepo",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					GitRepo: &core.GitRepoVolumeSource{
 | 
						|
						Repository: "foo",
 | 
						|
						Directory:  "../dots/bar",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:   field.ErrorTypeInvalid,
 | 
						|
			errfield:  "gitRepo.directory",
 | 
						|
			errdetail: `must not contain '..'`,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "GitRepo contains ..",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "gitrepo",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					GitRepo: &core.GitRepoVolumeSource{
 | 
						|
						Repository: "foo",
 | 
						|
						Directory:  "dots/../bar",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:   field.ErrorTypeInvalid,
 | 
						|
			errfield:  "gitRepo.directory",
 | 
						|
			errdetail: `must not contain '..'`,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "GitRepo absolute target",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "gitrepo",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					GitRepo: &core.GitRepoVolumeSource{
 | 
						|
						Repository: "foo",
 | 
						|
						Directory:  "/abstarget",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "gitRepo.directory",
 | 
						|
		},
 | 
						|
		// ISCSI
 | 
						|
		{
 | 
						|
			name: "valid ISCSI",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "iscsi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ISCSI: &core.ISCSIVolumeSource{
 | 
						|
						TargetPortal: "127.0.0.1",
 | 
						|
						IQN:          "iqn.2015-02.example.com:test",
 | 
						|
						Lun:          1,
 | 
						|
						FSType:       "ext4",
 | 
						|
						ReadOnly:     false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid IQN: eui format",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "iscsi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ISCSI: &core.ISCSIVolumeSource{
 | 
						|
						TargetPortal: "127.0.0.1",
 | 
						|
						IQN:          "eui.0123456789ABCDEF",
 | 
						|
						Lun:          1,
 | 
						|
						FSType:       "ext4",
 | 
						|
						ReadOnly:     false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid IQN: naa format",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "iscsi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ISCSI: &core.ISCSIVolumeSource{
 | 
						|
						TargetPortal: "127.0.0.1",
 | 
						|
						IQN:          "naa.62004567BA64678D0123456789ABCDEF",
 | 
						|
						Lun:          1,
 | 
						|
						FSType:       "ext4",
 | 
						|
						ReadOnly:     false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "empty portal",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "iscsi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ISCSI: &core.ISCSIVolumeSource{
 | 
						|
						TargetPortal: "",
 | 
						|
						IQN:          "iqn.2015-02.example.com:test",
 | 
						|
						Lun:          1,
 | 
						|
						FSType:       "ext4",
 | 
						|
						ReadOnly:     false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "iscsi.targetPortal",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "empty iqn",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "iscsi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ISCSI: &core.ISCSIVolumeSource{
 | 
						|
						TargetPortal: "127.0.0.1",
 | 
						|
						IQN:          "",
 | 
						|
						Lun:          1,
 | 
						|
						FSType:       "ext4",
 | 
						|
						ReadOnly:     false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "iscsi.iqn",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid IQN: iqn format",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "iscsi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ISCSI: &core.ISCSIVolumeSource{
 | 
						|
						TargetPortal: "127.0.0.1",
 | 
						|
						IQN:          "iqn.2015-02.example.com:test;ls;",
 | 
						|
						Lun:          1,
 | 
						|
						FSType:       "ext4",
 | 
						|
						ReadOnly:     false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "iscsi.iqn",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid IQN: eui format",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "iscsi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ISCSI: &core.ISCSIVolumeSource{
 | 
						|
						TargetPortal: "127.0.0.1",
 | 
						|
						IQN:          "eui.0123456789ABCDEFGHIJ",
 | 
						|
						Lun:          1,
 | 
						|
						FSType:       "ext4",
 | 
						|
						ReadOnly:     false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "iscsi.iqn",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid IQN: naa format",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "iscsi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ISCSI: &core.ISCSIVolumeSource{
 | 
						|
						TargetPortal: "127.0.0.1",
 | 
						|
						IQN:          "naa.62004567BA_4-78D.123456789ABCDEF",
 | 
						|
						Lun:          1,
 | 
						|
						FSType:       "ext4",
 | 
						|
						ReadOnly:     false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "iscsi.iqn",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid initiatorName",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "iscsi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ISCSI: &core.ISCSIVolumeSource{
 | 
						|
						TargetPortal:  "127.0.0.1",
 | 
						|
						IQN:           "iqn.2015-02.example.com:test",
 | 
						|
						Lun:           1,
 | 
						|
						InitiatorName: &validInitiatorName,
 | 
						|
						FSType:        "ext4",
 | 
						|
						ReadOnly:      false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid initiatorName",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "iscsi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ISCSI: &core.ISCSIVolumeSource{
 | 
						|
						TargetPortal:  "127.0.0.1",
 | 
						|
						IQN:           "iqn.2015-02.example.com:test",
 | 
						|
						Lun:           1,
 | 
						|
						InitiatorName: &invalidInitiatorName,
 | 
						|
						FSType:        "ext4",
 | 
						|
						ReadOnly:      false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "iscsi.initiatorname",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "empty secret",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "iscsi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ISCSI: &core.ISCSIVolumeSource{
 | 
						|
						TargetPortal:      "127.0.0.1",
 | 
						|
						IQN:               "iqn.2015-02.example.com:test",
 | 
						|
						Lun:               1,
 | 
						|
						FSType:            "ext4",
 | 
						|
						ReadOnly:          false,
 | 
						|
						DiscoveryCHAPAuth: true,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "iscsi.secretRef",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "empty secret",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "iscsi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ISCSI: &core.ISCSIVolumeSource{
 | 
						|
						TargetPortal:    "127.0.0.1",
 | 
						|
						IQN:             "iqn.2015-02.example.com:test",
 | 
						|
						Lun:             1,
 | 
						|
						FSType:          "ext4",
 | 
						|
						ReadOnly:        false,
 | 
						|
						SessionCHAPAuth: true,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "iscsi.secretRef",
 | 
						|
		},
 | 
						|
		// Secret
 | 
						|
		{
 | 
						|
			name: "valid Secret",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "secret",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Secret: &core.SecretVolumeSource{
 | 
						|
						SecretName: "my-secret",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid Secret with defaultMode",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "secret",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Secret: &core.SecretVolumeSource{
 | 
						|
						SecretName:  "my-secret",
 | 
						|
						DefaultMode: utilpointer.Int32Ptr(0644),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid Secret with projection and mode",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "secret",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Secret: &core.SecretVolumeSource{
 | 
						|
						SecretName: "my-secret",
 | 
						|
						Items: []core.KeyToPath{{
 | 
						|
							Key:  "key",
 | 
						|
							Path: "filename",
 | 
						|
							Mode: utilpointer.Int32Ptr(0644),
 | 
						|
						}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid Secret with subdir projection",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "secret",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Secret: &core.SecretVolumeSource{
 | 
						|
						SecretName: "my-secret",
 | 
						|
						Items: []core.KeyToPath{{
 | 
						|
							Key:  "key",
 | 
						|
							Path: "dir/filename",
 | 
						|
						}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "secret with missing path",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "secret",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Secret: &core.SecretVolumeSource{
 | 
						|
						SecretName: "s",
 | 
						|
						Items:      []core.KeyToPath{{Key: "key", Path: ""}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "secret.items[0].path",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "secret with leading ..",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "secret",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Secret: &core.SecretVolumeSource{
 | 
						|
						SecretName: "s",
 | 
						|
						Items:      []core.KeyToPath{{Key: "key", Path: "../foo"}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "secret.items[0].path",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "secret with .. inside",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "secret",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Secret: &core.SecretVolumeSource{
 | 
						|
						SecretName: "s",
 | 
						|
						Items:      []core.KeyToPath{{Key: "key", Path: "foo/../bar"}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "secret.items[0].path",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "secret with invalid positive defaultMode",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "secret",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Secret: &core.SecretVolumeSource{
 | 
						|
						SecretName:  "s",
 | 
						|
						DefaultMode: utilpointer.Int32Ptr(01000),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "secret.defaultMode",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "secret with invalid negative defaultMode",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "secret",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Secret: &core.SecretVolumeSource{
 | 
						|
						SecretName:  "s",
 | 
						|
						DefaultMode: utilpointer.Int32Ptr(-1),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "secret.defaultMode",
 | 
						|
		},
 | 
						|
		// ConfigMap
 | 
						|
		{
 | 
						|
			name: "valid ConfigMap",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "cfgmap",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ConfigMap: &core.ConfigMapVolumeSource{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{
 | 
						|
							Name: "my-cfgmap",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid ConfigMap with defaultMode",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "cfgmap",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ConfigMap: &core.ConfigMapVolumeSource{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{
 | 
						|
							Name: "my-cfgmap",
 | 
						|
						},
 | 
						|
						DefaultMode: utilpointer.Int32Ptr(0644),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid ConfigMap with projection and mode",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "cfgmap",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ConfigMap: &core.ConfigMapVolumeSource{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{
 | 
						|
							Name: "my-cfgmap"},
 | 
						|
						Items: []core.KeyToPath{{
 | 
						|
							Key:  "key",
 | 
						|
							Path: "filename",
 | 
						|
							Mode: utilpointer.Int32Ptr(0644),
 | 
						|
						}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid ConfigMap with subdir projection",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "cfgmap",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ConfigMap: &core.ConfigMapVolumeSource{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{
 | 
						|
							Name: "my-cfgmap"},
 | 
						|
						Items: []core.KeyToPath{{
 | 
						|
							Key:  "key",
 | 
						|
							Path: "dir/filename",
 | 
						|
						}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "configmap with missing path",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "cfgmap",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ConfigMap: &core.ConfigMapVolumeSource{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{Name: "c"},
 | 
						|
						Items:                []core.KeyToPath{{Key: "key", Path: ""}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "configMap.items[0].path",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "configmap with leading ..",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "cfgmap",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ConfigMap: &core.ConfigMapVolumeSource{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{Name: "c"},
 | 
						|
						Items:                []core.KeyToPath{{Key: "key", Path: "../foo"}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "configMap.items[0].path",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "configmap with .. inside",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "cfgmap",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ConfigMap: &core.ConfigMapVolumeSource{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{Name: "c"},
 | 
						|
						Items:                []core.KeyToPath{{Key: "key", Path: "foo/../bar"}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "configMap.items[0].path",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "configmap with invalid positive defaultMode",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "cfgmap",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ConfigMap: &core.ConfigMapVolumeSource{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{Name: "c"},
 | 
						|
						DefaultMode:          utilpointer.Int32Ptr(01000),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "configMap.defaultMode",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "configmap with invalid negative defaultMode",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "cfgmap",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ConfigMap: &core.ConfigMapVolumeSource{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{Name: "c"},
 | 
						|
						DefaultMode:          utilpointer.Int32Ptr(-1),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "configMap.defaultMode",
 | 
						|
		},
 | 
						|
		// Glusterfs
 | 
						|
		{
 | 
						|
			name: "valid Glusterfs",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "glusterfs",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Glusterfs: &core.GlusterfsVolumeSource{
 | 
						|
						EndpointsName: "host1",
 | 
						|
						Path:          "path",
 | 
						|
						ReadOnly:      false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "empty hosts",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "glusterfs",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Glusterfs: &core.GlusterfsVolumeSource{
 | 
						|
						EndpointsName: "",
 | 
						|
						Path:          "path",
 | 
						|
						ReadOnly:      false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "glusterfs.endpoints",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "empty path",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "glusterfs",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Glusterfs: &core.GlusterfsVolumeSource{
 | 
						|
						EndpointsName: "host",
 | 
						|
						Path:          "",
 | 
						|
						ReadOnly:      false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "glusterfs.path",
 | 
						|
		},
 | 
						|
		// Flocker
 | 
						|
		{
 | 
						|
			name: "valid Flocker -- datasetUUID",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "flocker",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Flocker: &core.FlockerVolumeSource{
 | 
						|
						DatasetUUID: "d846b09d-223d-43df-ab5b-d6db2206a0e4",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid Flocker -- datasetName",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "flocker",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Flocker: &core.FlockerVolumeSource{
 | 
						|
						DatasetName: "datasetName",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "both empty",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "flocker",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Flocker: &core.FlockerVolumeSource{
 | 
						|
						DatasetName: "",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "flocker",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "both specified",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "flocker",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Flocker: &core.FlockerVolumeSource{
 | 
						|
						DatasetName: "datasetName",
 | 
						|
						DatasetUUID: "d846b09d-223d-43df-ab5b-d6db2206a0e4",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "flocker",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "slash in flocker datasetName",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "flocker",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Flocker: &core.FlockerVolumeSource{
 | 
						|
						DatasetName: "foo/bar",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:   field.ErrorTypeInvalid,
 | 
						|
			errfield:  "flocker.datasetName",
 | 
						|
			errdetail: "must not contain '/'",
 | 
						|
		},
 | 
						|
		// RBD
 | 
						|
		{
 | 
						|
			name: "valid RBD",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "rbd",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					RBD: &core.RBDVolumeSource{
 | 
						|
						CephMonitors: []string{"foo"},
 | 
						|
						RBDImage:     "bar",
 | 
						|
						FSType:       "ext4",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "empty rbd monitors",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "rbd",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					RBD: &core.RBDVolumeSource{
 | 
						|
						CephMonitors: []string{},
 | 
						|
						RBDImage:     "bar",
 | 
						|
						FSType:       "ext4",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "rbd.monitors",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "empty image",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "rbd",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					RBD: &core.RBDVolumeSource{
 | 
						|
						CephMonitors: []string{"foo"},
 | 
						|
						RBDImage:     "",
 | 
						|
						FSType:       "ext4",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "rbd.image",
 | 
						|
		},
 | 
						|
		// Cinder
 | 
						|
		{
 | 
						|
			name: "valid Cinder",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "cinder",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Cinder: &core.CinderVolumeSource{
 | 
						|
						VolumeID: "29ea5088-4f60-4757-962e-dba678767887",
 | 
						|
						FSType:   "ext4",
 | 
						|
						ReadOnly: false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// CephFS
 | 
						|
		{
 | 
						|
			name: "valid CephFS",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "cephfs",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					CephFS: &core.CephFSVolumeSource{
 | 
						|
						Monitors: []string{"foo"},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "empty cephfs monitors",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "cephfs",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					CephFS: &core.CephFSVolumeSource{
 | 
						|
						Monitors: []string{},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "cephfs.monitors",
 | 
						|
		},
 | 
						|
		// DownwardAPI
 | 
						|
		{
 | 
						|
			name: "valid DownwardAPI",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "downwardapi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					DownwardAPI: &core.DownwardAPIVolumeSource{
 | 
						|
						Items: []core.DownwardAPIVolumeFile{
 | 
						|
							{
 | 
						|
								Path: "labels",
 | 
						|
								FieldRef: &core.ObjectFieldSelector{
 | 
						|
									APIVersion: "v1",
 | 
						|
									FieldPath:  "metadata.labels",
 | 
						|
								},
 | 
						|
							},
 | 
						|
							{
 | 
						|
								Path: "labels with subscript",
 | 
						|
								FieldRef: &core.ObjectFieldSelector{
 | 
						|
									APIVersion: "v1",
 | 
						|
									FieldPath:  "metadata.labels['key']",
 | 
						|
								},
 | 
						|
							},
 | 
						|
							{
 | 
						|
								Path: "labels with complex subscript",
 | 
						|
								FieldRef: &core.ObjectFieldSelector{
 | 
						|
									APIVersion: "v1",
 | 
						|
									FieldPath:  "metadata.labels['test.example.com/key']",
 | 
						|
								},
 | 
						|
							},
 | 
						|
							{
 | 
						|
								Path: "annotations",
 | 
						|
								FieldRef: &core.ObjectFieldSelector{
 | 
						|
									APIVersion: "v1",
 | 
						|
									FieldPath:  "metadata.annotations",
 | 
						|
								},
 | 
						|
							},
 | 
						|
							{
 | 
						|
								Path: "annotations with subscript",
 | 
						|
								FieldRef: &core.ObjectFieldSelector{
 | 
						|
									APIVersion: "v1",
 | 
						|
									FieldPath:  "metadata.annotations['key']",
 | 
						|
								},
 | 
						|
							},
 | 
						|
							{
 | 
						|
								Path: "annotations with complex subscript",
 | 
						|
								FieldRef: &core.ObjectFieldSelector{
 | 
						|
									APIVersion: "v1",
 | 
						|
									FieldPath:  "metadata.annotations['TEST.EXAMPLE.COM/key']",
 | 
						|
								},
 | 
						|
							},
 | 
						|
							{
 | 
						|
								Path: "namespace",
 | 
						|
								FieldRef: &core.ObjectFieldSelector{
 | 
						|
									APIVersion: "v1",
 | 
						|
									FieldPath:  "metadata.namespace",
 | 
						|
								},
 | 
						|
							},
 | 
						|
							{
 | 
						|
								Path: "name",
 | 
						|
								FieldRef: &core.ObjectFieldSelector{
 | 
						|
									APIVersion: "v1",
 | 
						|
									FieldPath:  "metadata.name",
 | 
						|
								},
 | 
						|
							},
 | 
						|
							{
 | 
						|
								Path: "path/with/subdirs",
 | 
						|
								FieldRef: &core.ObjectFieldSelector{
 | 
						|
									APIVersion: "v1",
 | 
						|
									FieldPath:  "metadata.labels",
 | 
						|
								},
 | 
						|
							},
 | 
						|
							{
 | 
						|
								Path: "path/./withdot",
 | 
						|
								FieldRef: &core.ObjectFieldSelector{
 | 
						|
									APIVersion: "v1",
 | 
						|
									FieldPath:  "metadata.labels",
 | 
						|
								},
 | 
						|
							},
 | 
						|
							{
 | 
						|
								Path: "path/with/embedded..dotdot",
 | 
						|
								FieldRef: &core.ObjectFieldSelector{
 | 
						|
									APIVersion: "v1",
 | 
						|
									FieldPath:  "metadata.labels",
 | 
						|
								},
 | 
						|
							},
 | 
						|
							{
 | 
						|
								Path: "path/with/leading/..dotdot",
 | 
						|
								FieldRef: &core.ObjectFieldSelector{
 | 
						|
									APIVersion: "v1",
 | 
						|
									FieldPath:  "metadata.labels",
 | 
						|
								},
 | 
						|
							},
 | 
						|
							{
 | 
						|
								Path: "cpu_limit",
 | 
						|
								ResourceFieldRef: &core.ResourceFieldSelector{
 | 
						|
									ContainerName: "test-container",
 | 
						|
									Resource:      "limits.cpu",
 | 
						|
								},
 | 
						|
							},
 | 
						|
							{
 | 
						|
								Path: "cpu_request",
 | 
						|
								ResourceFieldRef: &core.ResourceFieldSelector{
 | 
						|
									ContainerName: "test-container",
 | 
						|
									Resource:      "requests.cpu",
 | 
						|
								},
 | 
						|
							},
 | 
						|
							{
 | 
						|
								Path: "memory_limit",
 | 
						|
								ResourceFieldRef: &core.ResourceFieldSelector{
 | 
						|
									ContainerName: "test-container",
 | 
						|
									Resource:      "limits.memory",
 | 
						|
								},
 | 
						|
							},
 | 
						|
							{
 | 
						|
								Path: "memory_request",
 | 
						|
								ResourceFieldRef: &core.ResourceFieldSelector{
 | 
						|
									ContainerName: "test-container",
 | 
						|
									Resource:      "requests.memory",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "downapi valid defaultMode",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "downapi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					DownwardAPI: &core.DownwardAPIVolumeSource{
 | 
						|
						DefaultMode: utilpointer.Int32Ptr(0644),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "downapi valid item mode",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "downapi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					DownwardAPI: &core.DownwardAPIVolumeSource{
 | 
						|
						Items: []core.DownwardAPIVolumeFile{{
 | 
						|
							Mode: utilpointer.Int32Ptr(0644),
 | 
						|
							Path: "path",
 | 
						|
							FieldRef: &core.ObjectFieldSelector{
 | 
						|
								APIVersion: "v1",
 | 
						|
								FieldPath:  "metadata.labels",
 | 
						|
							},
 | 
						|
						}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "downapi invalid positive item mode",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "downapi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					DownwardAPI: &core.DownwardAPIVolumeSource{
 | 
						|
						Items: []core.DownwardAPIVolumeFile{{
 | 
						|
							Mode: utilpointer.Int32Ptr(01000),
 | 
						|
							Path: "path",
 | 
						|
							FieldRef: &core.ObjectFieldSelector{
 | 
						|
								APIVersion: "v1",
 | 
						|
								FieldPath:  "metadata.labels",
 | 
						|
							},
 | 
						|
						}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "downwardAPI.mode",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "downapi invalid negative item mode",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "downapi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					DownwardAPI: &core.DownwardAPIVolumeSource{
 | 
						|
						Items: []core.DownwardAPIVolumeFile{{
 | 
						|
							Mode: utilpointer.Int32Ptr(-1),
 | 
						|
							Path: "path",
 | 
						|
							FieldRef: &core.ObjectFieldSelector{
 | 
						|
								APIVersion: "v1",
 | 
						|
								FieldPath:  "metadata.labels",
 | 
						|
							},
 | 
						|
						}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "downwardAPI.mode",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "downapi empty metatada path",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "downapi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					DownwardAPI: &core.DownwardAPIVolumeSource{
 | 
						|
						Items: []core.DownwardAPIVolumeFile{{
 | 
						|
							Path: "",
 | 
						|
							FieldRef: &core.ObjectFieldSelector{
 | 
						|
								APIVersion: "v1",
 | 
						|
								FieldPath:  "metadata.labels",
 | 
						|
							},
 | 
						|
						}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "downwardAPI.path",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "downapi absolute path",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "downapi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					DownwardAPI: &core.DownwardAPIVolumeSource{
 | 
						|
						Items: []core.DownwardAPIVolumeFile{{
 | 
						|
							Path: "/absolutepath",
 | 
						|
							FieldRef: &core.ObjectFieldSelector{
 | 
						|
								APIVersion: "v1",
 | 
						|
								FieldPath:  "metadata.labels",
 | 
						|
							},
 | 
						|
						}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "downwardAPI.path",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "downapi dot dot path",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "downapi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					DownwardAPI: &core.DownwardAPIVolumeSource{
 | 
						|
						Items: []core.DownwardAPIVolumeFile{{
 | 
						|
							Path: "../../passwd",
 | 
						|
							FieldRef: &core.ObjectFieldSelector{
 | 
						|
								APIVersion: "v1",
 | 
						|
								FieldPath:  "metadata.labels",
 | 
						|
							},
 | 
						|
						}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:   field.ErrorTypeInvalid,
 | 
						|
			errfield:  "downwardAPI.path",
 | 
						|
			errdetail: `must not contain '..'`,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "downapi dot dot file name",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "downapi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					DownwardAPI: &core.DownwardAPIVolumeSource{
 | 
						|
						Items: []core.DownwardAPIVolumeFile{{
 | 
						|
							Path: "..badFileName",
 | 
						|
							FieldRef: &core.ObjectFieldSelector{
 | 
						|
								APIVersion: "v1",
 | 
						|
								FieldPath:  "metadata.labels",
 | 
						|
							},
 | 
						|
						}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:   field.ErrorTypeInvalid,
 | 
						|
			errfield:  "downwardAPI.path",
 | 
						|
			errdetail: `must not start with '..'`,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "downapi dot dot first level dirent",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "downapi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					DownwardAPI: &core.DownwardAPIVolumeSource{
 | 
						|
						Items: []core.DownwardAPIVolumeFile{{
 | 
						|
							Path: "..badDirName/goodFileName",
 | 
						|
							FieldRef: &core.ObjectFieldSelector{
 | 
						|
								APIVersion: "v1",
 | 
						|
								FieldPath:  "metadata.labels",
 | 
						|
							},
 | 
						|
						}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:   field.ErrorTypeInvalid,
 | 
						|
			errfield:  "downwardAPI.path",
 | 
						|
			errdetail: `must not start with '..'`,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "downapi fieldRef and ResourceFieldRef together",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "downapi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					DownwardAPI: &core.DownwardAPIVolumeSource{
 | 
						|
						Items: []core.DownwardAPIVolumeFile{{
 | 
						|
							Path: "test",
 | 
						|
							FieldRef: &core.ObjectFieldSelector{
 | 
						|
								APIVersion: "v1",
 | 
						|
								FieldPath:  "metadata.labels",
 | 
						|
							},
 | 
						|
							ResourceFieldRef: &core.ResourceFieldSelector{
 | 
						|
								ContainerName: "test-container",
 | 
						|
								Resource:      "requests.memory",
 | 
						|
							},
 | 
						|
						}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:   field.ErrorTypeInvalid,
 | 
						|
			errfield:  "downwardAPI",
 | 
						|
			errdetail: "fieldRef and resourceFieldRef can not be specified simultaneously",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "downapi invalid positive defaultMode",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "downapi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					DownwardAPI: &core.DownwardAPIVolumeSource{
 | 
						|
						DefaultMode: utilpointer.Int32Ptr(01000),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "downwardAPI.defaultMode",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "downapi invalid negative defaultMode",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "downapi",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					DownwardAPI: &core.DownwardAPIVolumeSource{
 | 
						|
						DefaultMode: utilpointer.Int32Ptr(-1),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "downwardAPI.defaultMode",
 | 
						|
		},
 | 
						|
		// FC
 | 
						|
		{
 | 
						|
			name: "FC valid targetWWNs and lun",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "fc",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					FC: &core.FCVolumeSource{
 | 
						|
						TargetWWNs: []string{"some_wwn"},
 | 
						|
						Lun:        utilpointer.Int32Ptr(1),
 | 
						|
						FSType:     "ext4",
 | 
						|
						ReadOnly:   false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "FC valid wwids",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "fc",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					FC: &core.FCVolumeSource{
 | 
						|
						WWIDs:    []string{"some_wwid"},
 | 
						|
						FSType:   "ext4",
 | 
						|
						ReadOnly: false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "FC empty targetWWNs and wwids",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "fc",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					FC: &core.FCVolumeSource{
 | 
						|
						TargetWWNs: []string{},
 | 
						|
						Lun:        utilpointer.Int32Ptr(1),
 | 
						|
						WWIDs:      []string{},
 | 
						|
						FSType:     "ext4",
 | 
						|
						ReadOnly:   false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:   field.ErrorTypeRequired,
 | 
						|
			errfield:  "fc.targetWWNs",
 | 
						|
			errdetail: "must specify either targetWWNs or wwids",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "FC invalid: both targetWWNs and wwids simultaneously",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "fc",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					FC: &core.FCVolumeSource{
 | 
						|
						TargetWWNs: []string{"some_wwn"},
 | 
						|
						Lun:        utilpointer.Int32Ptr(1),
 | 
						|
						WWIDs:      []string{"some_wwid"},
 | 
						|
						FSType:     "ext4",
 | 
						|
						ReadOnly:   false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:   field.ErrorTypeInvalid,
 | 
						|
			errfield:  "fc.targetWWNs",
 | 
						|
			errdetail: "targetWWNs and wwids can not be specified simultaneously",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "FC valid targetWWNs and empty lun",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "fc",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					FC: &core.FCVolumeSource{
 | 
						|
						TargetWWNs: []string{"wwn"},
 | 
						|
						Lun:        nil,
 | 
						|
						FSType:     "ext4",
 | 
						|
						ReadOnly:   false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:   field.ErrorTypeRequired,
 | 
						|
			errfield:  "fc.lun",
 | 
						|
			errdetail: "lun is required if targetWWNs is specified",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "FC valid targetWWNs and invalid lun",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "fc",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					FC: &core.FCVolumeSource{
 | 
						|
						TargetWWNs: []string{"wwn"},
 | 
						|
						Lun:        utilpointer.Int32Ptr(256),
 | 
						|
						FSType:     "ext4",
 | 
						|
						ReadOnly:   false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:   field.ErrorTypeInvalid,
 | 
						|
			errfield:  "fc.lun",
 | 
						|
			errdetail: validation.InclusiveRangeError(0, 255),
 | 
						|
		},
 | 
						|
		// FlexVolume
 | 
						|
		{
 | 
						|
			name: "valid FlexVolume",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "flex-volume",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					FlexVolume: &core.FlexVolumeSource{
 | 
						|
						Driver: "kubernetes.io/blue",
 | 
						|
						FSType: "ext4",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// AzureFile
 | 
						|
		{
 | 
						|
			name: "valid AzureFile",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "azure-file",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					AzureFile: &core.AzureFileVolumeSource{
 | 
						|
						SecretName: "key",
 | 
						|
						ShareName:  "share",
 | 
						|
						ReadOnly:   false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "AzureFile empty secret",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "azure-file",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					AzureFile: &core.AzureFileVolumeSource{
 | 
						|
						SecretName: "",
 | 
						|
						ShareName:  "share",
 | 
						|
						ReadOnly:   false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "azureFile.secretName",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "AzureFile empty share",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "azure-file",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					AzureFile: &core.AzureFileVolumeSource{
 | 
						|
						SecretName: "name",
 | 
						|
						ShareName:  "",
 | 
						|
						ReadOnly:   false,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "azureFile.shareName",
 | 
						|
		},
 | 
						|
		// Quobyte
 | 
						|
		{
 | 
						|
			name: "valid Quobyte",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "quobyte",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Quobyte: &core.QuobyteVolumeSource{
 | 
						|
						Registry: "registry:7861",
 | 
						|
						Volume:   "volume",
 | 
						|
						ReadOnly: false,
 | 
						|
						User:     "root",
 | 
						|
						Group:    "root",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "empty registry quobyte",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "quobyte",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Quobyte: &core.QuobyteVolumeSource{
 | 
						|
						Volume: "/test",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "quobyte.registry",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "wrong format registry quobyte",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "quobyte",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Quobyte: &core.QuobyteVolumeSource{
 | 
						|
						Registry: "registry7861",
 | 
						|
						Volume:   "/test",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "quobyte.registry",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "wrong format multiple registries quobyte",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "quobyte",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Quobyte: &core.QuobyteVolumeSource{
 | 
						|
						Registry: "registry:7861,reg2",
 | 
						|
						Volume:   "/test",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeInvalid,
 | 
						|
			errfield: "quobyte.registry",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "empty volume quobyte",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "quobyte",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					Quobyte: &core.QuobyteVolumeSource{
 | 
						|
						Registry: "registry:7861",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "quobyte.volume",
 | 
						|
		},
 | 
						|
		// AzureDisk
 | 
						|
		{
 | 
						|
			name: "valid AzureDisk",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "azure-disk",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					AzureDisk: &core.AzureDiskVolumeSource{
 | 
						|
						DiskName:    "foo",
 | 
						|
						DataDiskURI: "https://blob/vhds/bar.vhd",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "AzureDisk empty disk name",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "azure-disk",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					AzureDisk: &core.AzureDiskVolumeSource{
 | 
						|
						DiskName:    "",
 | 
						|
						DataDiskURI: "https://blob/vhds/bar.vhd",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "azureDisk.diskName",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "AzureDisk empty disk uri",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "azure-disk",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					AzureDisk: &core.AzureDiskVolumeSource{
 | 
						|
						DiskName:    "foo",
 | 
						|
						DataDiskURI: "",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "azureDisk.diskURI",
 | 
						|
		},
 | 
						|
		// ScaleIO
 | 
						|
		{
 | 
						|
			name: "valid scaleio volume",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "scaleio-volume",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ScaleIO: &core.ScaleIOVolumeSource{
 | 
						|
						Gateway:    "http://abcd/efg",
 | 
						|
						System:     "test-system",
 | 
						|
						VolumeName: "test-vol-1",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "ScaleIO with empty name",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "scaleio-volume",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ScaleIO: &core.ScaleIOVolumeSource{
 | 
						|
						Gateway:    "http://abcd/efg",
 | 
						|
						System:     "test-system",
 | 
						|
						VolumeName: "",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "scaleIO.volumeName",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "ScaleIO with empty gateway",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "scaleio-volume",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ScaleIO: &core.ScaleIOVolumeSource{
 | 
						|
						Gateway:    "",
 | 
						|
						System:     "test-system",
 | 
						|
						VolumeName: "test-vol-1",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "scaleIO.gateway",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "ScaleIO with empty system",
 | 
						|
			vol: core.Volume{
 | 
						|
				Name: "scaleio-volume",
 | 
						|
				VolumeSource: core.VolumeSource{
 | 
						|
					ScaleIO: &core.ScaleIOVolumeSource{
 | 
						|
						Gateway:    "http://agc/efg/gateway",
 | 
						|
						System:     "",
 | 
						|
						VolumeName: "test-vol-1",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errtype:  field.ErrorTypeRequired,
 | 
						|
			errfield: "scaleIO.system",
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for i, tc := range testCases {
 | 
						|
		names, errs := ValidateVolumes([]core.Volume{tc.vol}, field.NewPath("field"))
 | 
						|
		if len(errs) > 0 && tc.errtype == "" {
 | 
						|
			t.Errorf("[%d: %q] unexpected error(s): %v", i, tc.name, errs)
 | 
						|
		} else if len(errs) > 1 {
 | 
						|
			t.Errorf("[%d: %q] expected 1 error, got %d: %v", i, tc.name, len(errs), errs)
 | 
						|
		} else if len(errs) == 0 && tc.errtype != "" {
 | 
						|
			t.Errorf("[%d: %q] expected error type %v", i, tc.name, tc.errtype)
 | 
						|
		} else if len(errs) == 1 {
 | 
						|
			if errs[0].Type != tc.errtype {
 | 
						|
				t.Errorf("[%d: %q] expected error type %v, got %v", i, tc.name, tc.errtype, errs[0].Type)
 | 
						|
			} else if !strings.HasSuffix(errs[0].Field, "."+tc.errfield) {
 | 
						|
				t.Errorf("[%d: %q] expected error on field %q, got %q", i, tc.name, tc.errfield, errs[0].Field)
 | 
						|
			} else if !strings.Contains(errs[0].Detail, tc.errdetail) {
 | 
						|
				t.Errorf("[%d: %q] expected error detail %q, got %q", i, tc.name, tc.errdetail, errs[0].Detail)
 | 
						|
			}
 | 
						|
		} else {
 | 
						|
			if len(names) != 1 || !IsMatchedVolume(tc.vol.Name, names) {
 | 
						|
				t.Errorf("[%d: %q] wrong names result: %v", i, tc.name, names)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	dupsCase := []core.Volume{
 | 
						|
		{Name: "abc", VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}}},
 | 
						|
		{Name: "abc", VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}}},
 | 
						|
	}
 | 
						|
	_, errs := ValidateVolumes(dupsCase, field.NewPath("field"))
 | 
						|
	if len(errs) == 0 {
 | 
						|
		t.Errorf("expected error")
 | 
						|
	} else if len(errs) != 1 {
 | 
						|
		t.Errorf("expected 1 error, got %d: %v", len(errs), errs)
 | 
						|
	} else if errs[0].Type != field.ErrorTypeDuplicate {
 | 
						|
		t.Errorf("expected error type %v, got %v", field.ErrorTypeDuplicate, errs[0].Type)
 | 
						|
	}
 | 
						|
 | 
						|
	// Validate HugePages medium type for EmptyDir when HugePages feature is enabled/disabled
 | 
						|
	hugePagesCase := core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{Medium: core.StorageMediumHugePages}}
 | 
						|
 | 
						|
	// Enable alpha feature HugePages
 | 
						|
	err := utilfeature.DefaultFeatureGate.Set("HugePages=true")
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("Failed to enable feature gate for HugePages: %v", err)
 | 
						|
	}
 | 
						|
	if errs := validateVolumeSource(&hugePagesCase, field.NewPath("field").Index(0), "working"); len(errs) != 0 {
 | 
						|
		t.Errorf("Unexpected error when HugePages feature is enabled.")
 | 
						|
	}
 | 
						|
 | 
						|
	// Disable alpha feature HugePages
 | 
						|
	err = utilfeature.DefaultFeatureGate.Set("HugePages=false")
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("Failed to disable feature gate for HugePages: %v", err)
 | 
						|
	}
 | 
						|
	if errs := validateVolumeSource(&hugePagesCase, field.NewPath("field").Index(0), "failing"); len(errs) == 0 {
 | 
						|
		t.Errorf("Expected error when HugePages feature is disabled got nothing.")
 | 
						|
	}
 | 
						|
 | 
						|
}
 | 
						|
 | 
						|
func TestAlphaHugePagesIsolation(t *testing.T) {
 | 
						|
	successCases := []core.Pod{
 | 
						|
		{ // Basic fields.
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "123", Namespace: "ns"},
 | 
						|
			Spec: core.PodSpec{
 | 
						|
				Containers: []core.Container{
 | 
						|
					{
 | 
						|
						Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File",
 | 
						|
						Resources: core.ResourceRequirements{
 | 
						|
							Requests: core.ResourceList{
 | 
						|
								core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
								core.ResourceName(core.ResourceMemory): resource.MustParse("10G"),
 | 
						|
								core.ResourceName("hugepages-2Mi"):     resource.MustParse("1Gi"),
 | 
						|
							},
 | 
						|
							Limits: core.ResourceList{
 | 
						|
								core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
								core.ResourceName(core.ResourceMemory): resource.MustParse("10G"),
 | 
						|
								core.ResourceName("hugepages-2Mi"):     resource.MustParse("1Gi"),
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				RestartPolicy: core.RestartPolicyAlways,
 | 
						|
				DNSPolicy:     core.DNSClusterFirst,
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	failureCases := []core.Pod{
 | 
						|
		{ // Basic fields.
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "hugepages-requireCpuOrMemory", Namespace: "ns"},
 | 
						|
			Spec: core.PodSpec{
 | 
						|
				Containers: []core.Container{
 | 
						|
					{
 | 
						|
						Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File",
 | 
						|
						Resources: core.ResourceRequirements{
 | 
						|
							Requests: core.ResourceList{
 | 
						|
								core.ResourceName("hugepages-2Mi"): resource.MustParse("1Gi"),
 | 
						|
							},
 | 
						|
							Limits: core.ResourceList{
 | 
						|
								core.ResourceName("hugepages-2Mi"): resource.MustParse("1Gi"),
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				RestartPolicy: core.RestartPolicyAlways,
 | 
						|
				DNSPolicy:     core.DNSClusterFirst,
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{ // Basic fields.
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "hugepages-shared", Namespace: "ns"},
 | 
						|
			Spec: core.PodSpec{
 | 
						|
				Containers: []core.Container{
 | 
						|
					{
 | 
						|
						Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File",
 | 
						|
						Resources: core.ResourceRequirements{
 | 
						|
							Requests: core.ResourceList{
 | 
						|
								core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
								core.ResourceName(core.ResourceMemory): resource.MustParse("10G"),
 | 
						|
								core.ResourceName("hugepages-2Mi"):     resource.MustParse("1Gi"),
 | 
						|
							},
 | 
						|
							Limits: core.ResourceList{
 | 
						|
								core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
								core.ResourceName(core.ResourceMemory): resource.MustParse("10G"),
 | 
						|
								core.ResourceName("hugepages-2Mi"):     resource.MustParse("2Gi"),
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				RestartPolicy: core.RestartPolicyAlways,
 | 
						|
				DNSPolicy:     core.DNSClusterFirst,
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{ // Basic fields.
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "hugepages-multiple", Namespace: "ns"},
 | 
						|
			Spec: core.PodSpec{
 | 
						|
				Containers: []core.Container{
 | 
						|
					{
 | 
						|
						Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File",
 | 
						|
						Resources: core.ResourceRequirements{
 | 
						|
							Requests: core.ResourceList{
 | 
						|
								core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
								core.ResourceName(core.ResourceMemory): resource.MustParse("10G"),
 | 
						|
								core.ResourceName("hugepages-1Gi"):     resource.MustParse("2Gi"),
 | 
						|
							},
 | 
						|
							Limits: core.ResourceList{
 | 
						|
								core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
								core.ResourceName(core.ResourceMemory): resource.MustParse("10G"),
 | 
						|
								core.ResourceName("hugepages-2Mi"):     resource.MustParse("1Gi"),
 | 
						|
								core.ResourceName("hugepages-1Gi"):     resource.MustParse("2Gi"),
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				RestartPolicy: core.RestartPolicyAlways,
 | 
						|
				DNSPolicy:     core.DNSClusterFirst,
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	// Enable alpha feature HugePages
 | 
						|
	err := utilfeature.DefaultFeatureGate.Set("HugePages=true")
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("Failed to enable feature gate for HugePages: %v", err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	for i := range successCases {
 | 
						|
		pod := &successCases[i]
 | 
						|
		if errs := ValidatePod(pod); len(errs) != 0 {
 | 
						|
			t.Errorf("Unexpected error for case[%d], err: %v", i, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	for i := range failureCases {
 | 
						|
		pod := &failureCases[i]
 | 
						|
		if errs := ValidatePod(pod); len(errs) == 0 {
 | 
						|
			t.Errorf("Expected error for case[%d], pod: %v", i, pod.Name)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	// Disable alpha feature HugePages
 | 
						|
	err = utilfeature.DefaultFeatureGate.Set("HugePages=false")
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("Failed to disable feature gate for HugePages: %v", err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	// Disable alpha feature HugePages and ensure all success cases fail
 | 
						|
	for i := range successCases {
 | 
						|
		pod := &successCases[i]
 | 
						|
		if errs := ValidatePod(pod); len(errs) == 0 {
 | 
						|
			t.Errorf("Expected error for case[%d], pod: %v", i, pod.Name)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestAlphaPVCVolumeMode(t *testing.T) {
 | 
						|
	// Enable alpha feature BlockVolume for PVC
 | 
						|
	err := utilfeature.DefaultFeatureGate.Set("BlockVolume=true")
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("Failed to enable feature gate for BlockVolume: %v", err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	block := core.PersistentVolumeBlock
 | 
						|
	file := core.PersistentVolumeFilesystem
 | 
						|
	fake := core.PersistentVolumeMode("fake")
 | 
						|
	empty := core.PersistentVolumeMode("")
 | 
						|
 | 
						|
	// Success Cases
 | 
						|
	successCasesPVC := map[string]*core.PersistentVolumeClaim{
 | 
						|
		"valid block value":      createTestVolModePVC(&block),
 | 
						|
		"valid filesystem value": createTestVolModePVC(&file),
 | 
						|
		"valid nil value":        createTestVolModePVC(nil),
 | 
						|
	}
 | 
						|
	for k, v := range successCasesPVC {
 | 
						|
		if errs := ValidatePersistentVolumeClaim(v); len(errs) != 0 {
 | 
						|
			t.Errorf("expected success for %s", k)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// Error Cases
 | 
						|
	errorCasesPVC := map[string]*core.PersistentVolumeClaim{
 | 
						|
		"invalid value": createTestVolModePVC(&fake),
 | 
						|
		"empty value":   createTestVolModePVC(&empty),
 | 
						|
	}
 | 
						|
	for k, v := range errorCasesPVC {
 | 
						|
		if errs := ValidatePersistentVolumeClaim(v); len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure for %s", k)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestAlphaPVVolumeMode(t *testing.T) {
 | 
						|
	// Enable alpha feature BlockVolume for PV
 | 
						|
	err := utilfeature.DefaultFeatureGate.Set("BlockVolume=true")
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("Failed to enable feature gate for BlockVolume: %v", err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	block := core.PersistentVolumeBlock
 | 
						|
	file := core.PersistentVolumeFilesystem
 | 
						|
	fake := core.PersistentVolumeMode("fake")
 | 
						|
	empty := core.PersistentVolumeMode("")
 | 
						|
 | 
						|
	// Success Cases
 | 
						|
	successCasesPV := map[string]*core.PersistentVolume{
 | 
						|
		"valid block value":      createTestVolModePV(&block),
 | 
						|
		"valid filesystem value": createTestVolModePV(&file),
 | 
						|
		"valid nil value":        createTestVolModePV(nil),
 | 
						|
	}
 | 
						|
	for k, v := range successCasesPV {
 | 
						|
		if errs := ValidatePersistentVolume(v); len(errs) != 0 {
 | 
						|
			t.Errorf("expected success for %s", k)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// Error Cases
 | 
						|
	errorCasesPV := map[string]*core.PersistentVolume{
 | 
						|
		"invalid value": createTestVolModePV(&fake),
 | 
						|
		"empty value":   createTestVolModePV(&empty),
 | 
						|
	}
 | 
						|
	for k, v := range errorCasesPV {
 | 
						|
		if errs := ValidatePersistentVolume(v); len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure for %s", k)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func createTestVolModePVC(vmode *core.PersistentVolumeMode) *core.PersistentVolumeClaim {
 | 
						|
	validName := "valid-storage-class"
 | 
						|
 | 
						|
	pvc := core.PersistentVolumeClaim{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name:      "foo",
 | 
						|
			Namespace: "default",
 | 
						|
		},
 | 
						|
		Spec: core.PersistentVolumeClaimSpec{
 | 
						|
			Resources: core.ResourceRequirements{
 | 
						|
				Requests: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
			AccessModes:      []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
			StorageClassName: &validName,
 | 
						|
			VolumeMode:       vmode,
 | 
						|
		},
 | 
						|
	}
 | 
						|
	return &pvc
 | 
						|
}
 | 
						|
 | 
						|
func createTestVolModePV(vmode *core.PersistentVolumeMode) *core.PersistentVolume {
 | 
						|
 | 
						|
	// PersistentVolume with VolumeMode set (valid and invalid)
 | 
						|
	pv := core.PersistentVolume{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name:      "foo",
 | 
						|
			Namespace: "",
 | 
						|
		},
 | 
						|
		Spec: core.PersistentVolumeSpec{
 | 
						|
			Capacity: core.ResourceList{
 | 
						|
				core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
			},
 | 
						|
			AccessModes: []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
			PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
				HostPath: &core.HostPathVolumeSource{
 | 
						|
					Path: "/foo",
 | 
						|
					Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
				},
 | 
						|
			},
 | 
						|
			StorageClassName: "test-storage-class",
 | 
						|
			VolumeMode:       vmode,
 | 
						|
		},
 | 
						|
	}
 | 
						|
	return &pv
 | 
						|
}
 | 
						|
 | 
						|
func createTestPV() *core.PersistentVolume {
 | 
						|
 | 
						|
	// PersistentVolume with VolumeMode set (valid and invalid)
 | 
						|
	pv := core.PersistentVolume{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name:      "foo",
 | 
						|
			Namespace: "",
 | 
						|
		},
 | 
						|
		Spec: core.PersistentVolumeSpec{
 | 
						|
			Capacity: core.ResourceList{
 | 
						|
				core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
			},
 | 
						|
			AccessModes: []core.PersistentVolumeAccessMode{core.ReadWriteOnce},
 | 
						|
			PersistentVolumeSource: core.PersistentVolumeSource{
 | 
						|
				HostPath: &core.HostPathVolumeSource{
 | 
						|
					Path: "/foo",
 | 
						|
					Type: newHostPathType(string(core.HostPathDirectory)),
 | 
						|
				},
 | 
						|
			},
 | 
						|
			StorageClassName: "test-storage-class",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	return &pv
 | 
						|
}
 | 
						|
 | 
						|
func TestAlphaLocalStorageCapacityIsolation(t *testing.T) {
 | 
						|
 | 
						|
	testCases := []core.VolumeSource{
 | 
						|
		{EmptyDir: &core.EmptyDirVolumeSource{SizeLimit: resource.NewQuantity(int64(5), resource.BinarySI)}},
 | 
						|
	}
 | 
						|
	// Enable alpha feature LocalStorageCapacityIsolation
 | 
						|
	err := utilfeature.DefaultFeatureGate.Set("LocalStorageCapacityIsolation=true")
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("Failed to enable feature gate for LocalStorageCapacityIsolation: %v", err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	for _, tc := range testCases {
 | 
						|
		if errs := validateVolumeSource(&tc, field.NewPath("spec"), "tmpvol"); len(errs) != 0 {
 | 
						|
			t.Errorf("expected success: %v", errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	// Disable alpha feature LocalStorageCapacityIsolation
 | 
						|
	err = utilfeature.DefaultFeatureGate.Set("LocalStorageCapacityIsolation=false")
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("Failed to disable feature gate for LocalStorageCapacityIsolation: %v", err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	for _, tc := range testCases {
 | 
						|
		if errs := validateVolumeSource(&tc, field.NewPath("spec"), "tmpvol"); len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure: %v", errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	containerLimitCase := core.ResourceRequirements{
 | 
						|
		Limits: core.ResourceList{
 | 
						|
			core.ResourceEphemeralStorage: *resource.NewMilliQuantity(
 | 
						|
				int64(40000),
 | 
						|
				resource.BinarySI),
 | 
						|
		},
 | 
						|
	}
 | 
						|
	// Enable alpha feature LocalStorageCapacityIsolation
 | 
						|
	err = utilfeature.DefaultFeatureGate.Set("LocalStorageCapacityIsolation=true")
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("Failed to enable feature gate for LocalStorageCapacityIsolation: %v", err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	if errs := ValidateResourceRequirements(&containerLimitCase, field.NewPath("resources")); len(errs) != 0 {
 | 
						|
		t.Errorf("expected success: %v", errs)
 | 
						|
	}
 | 
						|
	// Disable alpha feature LocalStorageCapacityIsolation
 | 
						|
	err = utilfeature.DefaultFeatureGate.Set("LocalStorageCapacityIsolation=false")
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("Failed to disable feature gate for LocalStorageCapacityIsolation: %v", err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	if errs := ValidateResourceRequirements(&containerLimitCase, field.NewPath("resources")); len(errs) == 0 {
 | 
						|
		t.Errorf("expected failure: %v", errs)
 | 
						|
	}
 | 
						|
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateResourceQuotaWithAlphaLocalStorageCapacityIsolation(t *testing.T) {
 | 
						|
	spec := core.ResourceQuotaSpec{
 | 
						|
		Hard: core.ResourceList{
 | 
						|
			core.ResourceCPU:                      resource.MustParse("100"),
 | 
						|
			core.ResourceMemory:                   resource.MustParse("10000"),
 | 
						|
			core.ResourceRequestsCPU:              resource.MustParse("100"),
 | 
						|
			core.ResourceRequestsMemory:           resource.MustParse("10000"),
 | 
						|
			core.ResourceLimitsCPU:                resource.MustParse("100"),
 | 
						|
			core.ResourceLimitsMemory:             resource.MustParse("10000"),
 | 
						|
			core.ResourcePods:                     resource.MustParse("10"),
 | 
						|
			core.ResourceServices:                 resource.MustParse("0"),
 | 
						|
			core.ResourceReplicationControllers:   resource.MustParse("10"),
 | 
						|
			core.ResourceQuotas:                   resource.MustParse("10"),
 | 
						|
			core.ResourceConfigMaps:               resource.MustParse("10"),
 | 
						|
			core.ResourceSecrets:                  resource.MustParse("10"),
 | 
						|
			core.ResourceEphemeralStorage:         resource.MustParse("10000"),
 | 
						|
			core.ResourceRequestsEphemeralStorage: resource.MustParse("10000"),
 | 
						|
			core.ResourceLimitsEphemeralStorage:   resource.MustParse("10000"),
 | 
						|
		},
 | 
						|
	}
 | 
						|
	resourceQuota := &core.ResourceQuota{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name:      "abc",
 | 
						|
			Namespace: "foo",
 | 
						|
		},
 | 
						|
		Spec: spec,
 | 
						|
	}
 | 
						|
 | 
						|
	// Enable alpha feature LocalStorageCapacityIsolation
 | 
						|
	err := utilfeature.DefaultFeatureGate.Set("LocalStorageCapacityIsolation=true")
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("Failed to enable feature gate for LocalStorageCapacityIsolation: %v", err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	if errs := ValidateResourceQuota(resourceQuota); len(errs) != 0 {
 | 
						|
		t.Errorf("expected success: %v", errs)
 | 
						|
	}
 | 
						|
 | 
						|
	// Disable alpha feature LocalStorageCapacityIsolation
 | 
						|
	err = utilfeature.DefaultFeatureGate.Set("LocalStorageCapacityIsolation=false")
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("Failed to disable feature gate for LocalStorageCapacityIsolation: %v", err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	errs := ValidateResourceQuota(resourceQuota)
 | 
						|
	if len(errs) == 0 {
 | 
						|
		t.Errorf("expected failure for %s", resourceQuota.Name)
 | 
						|
	}
 | 
						|
	expectedErrMes := "ResourceEphemeralStorage field disabled by feature-gate for ResourceQuota"
 | 
						|
	for i := range errs {
 | 
						|
		if !strings.Contains(errs[i].Detail, expectedErrMes) {
 | 
						|
			t.Errorf("[%s]: expected error detail either empty or %s, got %s", resourceQuota.Name, expectedErrMes, errs[i].Detail)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidatePorts(t *testing.T) {
 | 
						|
	successCase := []core.ContainerPort{
 | 
						|
		{Name: "abc", ContainerPort: 80, HostPort: 80, Protocol: "TCP"},
 | 
						|
		{Name: "easy", ContainerPort: 82, Protocol: "TCP"},
 | 
						|
		{Name: "as", ContainerPort: 83, Protocol: "UDP"},
 | 
						|
		{Name: "do-re-me", ContainerPort: 84, Protocol: "UDP"},
 | 
						|
		{ContainerPort: 85, Protocol: "TCP"},
 | 
						|
	}
 | 
						|
	if errs := validateContainerPorts(successCase, field.NewPath("field")); len(errs) != 0 {
 | 
						|
		t.Errorf("expected success: %v", errs)
 | 
						|
	}
 | 
						|
 | 
						|
	nonCanonicalCase := []core.ContainerPort{
 | 
						|
		{ContainerPort: 80, Protocol: "TCP"},
 | 
						|
	}
 | 
						|
	if errs := validateContainerPorts(nonCanonicalCase, field.NewPath("field")); len(errs) != 0 {
 | 
						|
		t.Errorf("expected success: %v", errs)
 | 
						|
	}
 | 
						|
 | 
						|
	errorCases := map[string]struct {
 | 
						|
		P []core.ContainerPort
 | 
						|
		T field.ErrorType
 | 
						|
		F string
 | 
						|
		D string
 | 
						|
	}{
 | 
						|
		"name > 15 characters": {
 | 
						|
			[]core.ContainerPort{{Name: strings.Repeat("a", 16), ContainerPort: 80, Protocol: "TCP"}},
 | 
						|
			field.ErrorTypeInvalid,
 | 
						|
			"name", "15",
 | 
						|
		},
 | 
						|
		"name contains invalid characters": {
 | 
						|
			[]core.ContainerPort{{Name: "a.b.c", ContainerPort: 80, Protocol: "TCP"}},
 | 
						|
			field.ErrorTypeInvalid,
 | 
						|
			"name", "alpha-numeric",
 | 
						|
		},
 | 
						|
		"name is a number": {
 | 
						|
			[]core.ContainerPort{{Name: "80", ContainerPort: 80, Protocol: "TCP"}},
 | 
						|
			field.ErrorTypeInvalid,
 | 
						|
			"name", "at least one letter",
 | 
						|
		},
 | 
						|
		"name not unique": {
 | 
						|
			[]core.ContainerPort{
 | 
						|
				{Name: "abc", ContainerPort: 80, Protocol: "TCP"},
 | 
						|
				{Name: "abc", ContainerPort: 81, Protocol: "TCP"},
 | 
						|
			},
 | 
						|
			field.ErrorTypeDuplicate,
 | 
						|
			"[1].name", "",
 | 
						|
		},
 | 
						|
		"zero container port": {
 | 
						|
			[]core.ContainerPort{{ContainerPort: 0, Protocol: "TCP"}},
 | 
						|
			field.ErrorTypeRequired,
 | 
						|
			"containerPort", "",
 | 
						|
		},
 | 
						|
		"invalid container port": {
 | 
						|
			[]core.ContainerPort{{ContainerPort: 65536, Protocol: "TCP"}},
 | 
						|
			field.ErrorTypeInvalid,
 | 
						|
			"containerPort", "between",
 | 
						|
		},
 | 
						|
		"invalid host port": {
 | 
						|
			[]core.ContainerPort{{ContainerPort: 80, HostPort: 65536, Protocol: "TCP"}},
 | 
						|
			field.ErrorTypeInvalid,
 | 
						|
			"hostPort", "between",
 | 
						|
		},
 | 
						|
		"invalid protocol case": {
 | 
						|
			[]core.ContainerPort{{ContainerPort: 80, Protocol: "tcp"}},
 | 
						|
			field.ErrorTypeNotSupported,
 | 
						|
			"protocol", `supported values: "TCP", "UDP"`,
 | 
						|
		},
 | 
						|
		"invalid protocol": {
 | 
						|
			[]core.ContainerPort{{ContainerPort: 80, Protocol: "ICMP"}},
 | 
						|
			field.ErrorTypeNotSupported,
 | 
						|
			"protocol", `supported values: "TCP", "UDP"`,
 | 
						|
		},
 | 
						|
		"protocol required": {
 | 
						|
			[]core.ContainerPort{{Name: "abc", ContainerPort: 80}},
 | 
						|
			field.ErrorTypeRequired,
 | 
						|
			"protocol", "",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for k, v := range errorCases {
 | 
						|
		errs := validateContainerPorts(v.P, field.NewPath("field"))
 | 
						|
		if len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure for %s", k)
 | 
						|
		}
 | 
						|
		for i := range errs {
 | 
						|
			if errs[i].Type != v.T {
 | 
						|
				t.Errorf("%s: expected error to have type %q: %q", k, v.T, errs[i].Type)
 | 
						|
			}
 | 
						|
			if !strings.Contains(errs[i].Field, v.F) {
 | 
						|
				t.Errorf("%s: expected error field %q: %q", k, v.F, errs[i].Field)
 | 
						|
			}
 | 
						|
			if !strings.Contains(errs[i].Detail, v.D) {
 | 
						|
				t.Errorf("%s: expected error detail %q, got %q", k, v.D, errs[i].Detail)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestLocalStorageEnvWithFeatureGate(t *testing.T) {
 | 
						|
	testCases := []core.EnvVar{
 | 
						|
		{
 | 
						|
			Name: "ephemeral-storage-limits",
 | 
						|
			ValueFrom: &core.EnvVarSource{
 | 
						|
				ResourceFieldRef: &core.ResourceFieldSelector{
 | 
						|
					ContainerName: "test-container",
 | 
						|
					Resource:      "limits.ephemeral-storage",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Name: "ephemeral-storage-requests",
 | 
						|
			ValueFrom: &core.EnvVarSource{
 | 
						|
				ResourceFieldRef: &core.ResourceFieldSelector{
 | 
						|
					ContainerName: "test-container",
 | 
						|
					Resource:      "requests.ephemeral-storage",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	// Enable alpha feature LocalStorageCapacityIsolation
 | 
						|
	err := utilfeature.DefaultFeatureGate.Set("LocalStorageCapacityIsolation=true")
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("Failed to enable feature gate for LocalStorageCapacityIsolation: %v", err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	for _, testCase := range testCases {
 | 
						|
		if errs := validateEnvVarValueFrom(testCase, field.NewPath("field")); len(errs) != 0 {
 | 
						|
			t.Errorf("expected success, got: %v", errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// Disable alpha feature LocalStorageCapacityIsolation
 | 
						|
	err = utilfeature.DefaultFeatureGate.Set("LocalStorageCapacityIsolation=false")
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("Failed to disable feature gate for LocalStorageCapacityIsolation: %v", err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	for _, testCase := range testCases {
 | 
						|
		if errs := validateEnvVarValueFrom(testCase, field.NewPath("field")); len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure for %v", testCase.Name)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateEnv(t *testing.T) {
 | 
						|
	successCase := []core.EnvVar{
 | 
						|
		{Name: "abc", Value: "value"},
 | 
						|
		{Name: "ABC", Value: "value"},
 | 
						|
		{Name: "AbC_123", Value: "value"},
 | 
						|
		{Name: "abc", Value: ""},
 | 
						|
		{Name: "a.b.c", Value: "value"},
 | 
						|
		{Name: "a-b-c", Value: "value"},
 | 
						|
		{
 | 
						|
			Name: "abc",
 | 
						|
			ValueFrom: &core.EnvVarSource{
 | 
						|
				FieldRef: &core.ObjectFieldSelector{
 | 
						|
					APIVersion: legacyscheme.Registry.GroupOrDie(core.GroupName).GroupVersions[0].String(),
 | 
						|
					FieldPath:  "metadata.annotations['key']",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Name: "abc",
 | 
						|
			ValueFrom: &core.EnvVarSource{
 | 
						|
				FieldRef: &core.ObjectFieldSelector{
 | 
						|
					APIVersion: legacyscheme.Registry.GroupOrDie(core.GroupName).GroupVersions[0].String(),
 | 
						|
					FieldPath:  "metadata.labels['key']",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Name: "abc",
 | 
						|
			ValueFrom: &core.EnvVarSource{
 | 
						|
				FieldRef: &core.ObjectFieldSelector{
 | 
						|
					APIVersion: legacyscheme.Registry.GroupOrDie(core.GroupName).GroupVersions[0].String(),
 | 
						|
					FieldPath:  "metadata.name",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Name: "abc",
 | 
						|
			ValueFrom: &core.EnvVarSource{
 | 
						|
				FieldRef: &core.ObjectFieldSelector{
 | 
						|
					APIVersion: legacyscheme.Registry.GroupOrDie(core.GroupName).GroupVersions[0].String(),
 | 
						|
					FieldPath:  "metadata.namespace",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Name: "abc",
 | 
						|
			ValueFrom: &core.EnvVarSource{
 | 
						|
				FieldRef: &core.ObjectFieldSelector{
 | 
						|
					APIVersion: legacyscheme.Registry.GroupOrDie(core.GroupName).GroupVersions[0].String(),
 | 
						|
					FieldPath:  "metadata.uid",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Name: "abc",
 | 
						|
			ValueFrom: &core.EnvVarSource{
 | 
						|
				FieldRef: &core.ObjectFieldSelector{
 | 
						|
					APIVersion: legacyscheme.Registry.GroupOrDie(core.GroupName).GroupVersions[0].String(),
 | 
						|
					FieldPath:  "spec.nodeName",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Name: "abc",
 | 
						|
			ValueFrom: &core.EnvVarSource{
 | 
						|
				FieldRef: &core.ObjectFieldSelector{
 | 
						|
					APIVersion: legacyscheme.Registry.GroupOrDie(core.GroupName).GroupVersions[0].String(),
 | 
						|
					FieldPath:  "spec.serviceAccountName",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Name: "abc",
 | 
						|
			ValueFrom: &core.EnvVarSource{
 | 
						|
				FieldRef: &core.ObjectFieldSelector{
 | 
						|
					APIVersion: legacyscheme.Registry.GroupOrDie(core.GroupName).GroupVersions[0].String(),
 | 
						|
					FieldPath:  "status.hostIP",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Name: "abc",
 | 
						|
			ValueFrom: &core.EnvVarSource{
 | 
						|
				FieldRef: &core.ObjectFieldSelector{
 | 
						|
					APIVersion: legacyscheme.Registry.GroupOrDie(core.GroupName).GroupVersions[0].String(),
 | 
						|
					FieldPath:  "status.podIP",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Name: "secret_value",
 | 
						|
			ValueFrom: &core.EnvVarSource{
 | 
						|
				SecretKeyRef: &core.SecretKeySelector{
 | 
						|
					LocalObjectReference: core.LocalObjectReference{
 | 
						|
						Name: "some-secret",
 | 
						|
					},
 | 
						|
					Key: "secret-key",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Name: "ENV_VAR_1",
 | 
						|
			ValueFrom: &core.EnvVarSource{
 | 
						|
				ConfigMapKeyRef: &core.ConfigMapKeySelector{
 | 
						|
					LocalObjectReference: core.LocalObjectReference{
 | 
						|
						Name: "some-config-map",
 | 
						|
					},
 | 
						|
					Key: "some-key",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	if errs := ValidateEnv(successCase, field.NewPath("field")); len(errs) != 0 {
 | 
						|
		t.Errorf("expected success, got: %v", errs)
 | 
						|
	}
 | 
						|
 | 
						|
	errorCases := []struct {
 | 
						|
		name          string
 | 
						|
		envs          []core.EnvVar
 | 
						|
		expectedError string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name:          "zero-length name",
 | 
						|
			envs:          []core.EnvVar{{Name: ""}},
 | 
						|
			expectedError: "[0].name: Required value",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:          "illegal character",
 | 
						|
			envs:          []core.EnvVar{{Name: "a!b"}},
 | 
						|
			expectedError: `[0].name: Invalid value: "a!b": ` + envVarNameErrMsg,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:          "dot only",
 | 
						|
			envs:          []core.EnvVar{{Name: "."}},
 | 
						|
			expectedError: `[0].name: Invalid value: ".": must not be`,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:          "double dots only",
 | 
						|
			envs:          []core.EnvVar{{Name: ".."}},
 | 
						|
			expectedError: `[0].name: Invalid value: "..": must not be`,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:          "leading double dots",
 | 
						|
			envs:          []core.EnvVar{{Name: "..abc"}},
 | 
						|
			expectedError: `[0].name: Invalid value: "..abc": must not start with`,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "value and valueFrom specified",
 | 
						|
			envs: []core.EnvVar{{
 | 
						|
				Name:  "abc",
 | 
						|
				Value: "foo",
 | 
						|
				ValueFrom: &core.EnvVarSource{
 | 
						|
					FieldRef: &core.ObjectFieldSelector{
 | 
						|
						APIVersion: legacyscheme.Registry.GroupOrDie(core.GroupName).GroupVersions[0].String(),
 | 
						|
						FieldPath:  "metadata.name",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			expectedError: "[0].valueFrom: Invalid value: \"\": may not be specified when `value` is not empty",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valueFrom without a source",
 | 
						|
			envs: []core.EnvVar{{
 | 
						|
				Name:      "abc",
 | 
						|
				ValueFrom: &core.EnvVarSource{},
 | 
						|
			}},
 | 
						|
			expectedError: "[0].valueFrom: Invalid value: \"\": must specify one of: `fieldRef`, `resourceFieldRef`, `configMapKeyRef` or `secretKeyRef`",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valueFrom.fieldRef and valueFrom.secretKeyRef specified",
 | 
						|
			envs: []core.EnvVar{{
 | 
						|
				Name: "abc",
 | 
						|
				ValueFrom: &core.EnvVarSource{
 | 
						|
					FieldRef: &core.ObjectFieldSelector{
 | 
						|
						APIVersion: legacyscheme.Registry.GroupOrDie(core.GroupName).GroupVersions[0].String(),
 | 
						|
						FieldPath:  "metadata.name",
 | 
						|
					},
 | 
						|
					SecretKeyRef: &core.SecretKeySelector{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{
 | 
						|
							Name: "a-secret",
 | 
						|
						},
 | 
						|
						Key: "a-key",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			expectedError: "[0].valueFrom: Invalid value: \"\": may not have more than one field specified at a time",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valueFrom.fieldRef and valueFrom.configMapKeyRef set",
 | 
						|
			envs: []core.EnvVar{{
 | 
						|
				Name: "some_var_name",
 | 
						|
				ValueFrom: &core.EnvVarSource{
 | 
						|
					FieldRef: &core.ObjectFieldSelector{
 | 
						|
						APIVersion: legacyscheme.Registry.GroupOrDie(core.GroupName).GroupVersions[0].String(),
 | 
						|
						FieldPath:  "metadata.name",
 | 
						|
					},
 | 
						|
					ConfigMapKeyRef: &core.ConfigMapKeySelector{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{
 | 
						|
							Name: "some-config-map",
 | 
						|
						},
 | 
						|
						Key: "some-key",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			expectedError: `[0].valueFrom: Invalid value: "": may not have more than one field specified at a time`,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valueFrom.fieldRef and valueFrom.secretKeyRef specified",
 | 
						|
			envs: []core.EnvVar{{
 | 
						|
				Name: "abc",
 | 
						|
				ValueFrom: &core.EnvVarSource{
 | 
						|
					FieldRef: &core.ObjectFieldSelector{
 | 
						|
						APIVersion: legacyscheme.Registry.GroupOrDie(core.GroupName).GroupVersions[0].String(),
 | 
						|
						FieldPath:  "metadata.name",
 | 
						|
					},
 | 
						|
					SecretKeyRef: &core.SecretKeySelector{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{
 | 
						|
							Name: "a-secret",
 | 
						|
						},
 | 
						|
						Key: "a-key",
 | 
						|
					},
 | 
						|
					ConfigMapKeyRef: &core.ConfigMapKeySelector{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{
 | 
						|
							Name: "some-config-map",
 | 
						|
						},
 | 
						|
						Key: "some-key",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			expectedError: `[0].valueFrom: Invalid value: "": may not have more than one field specified at a time`,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valueFrom.secretKeyRef.name invalid",
 | 
						|
			envs: []core.EnvVar{{
 | 
						|
				Name: "abc",
 | 
						|
				ValueFrom: &core.EnvVarSource{
 | 
						|
					SecretKeyRef: &core.SecretKeySelector{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{
 | 
						|
							Name: "$%^&*#",
 | 
						|
						},
 | 
						|
						Key: "a-key",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valueFrom.configMapKeyRef.name invalid",
 | 
						|
			envs: []core.EnvVar{{
 | 
						|
				Name: "abc",
 | 
						|
				ValueFrom: &core.EnvVarSource{
 | 
						|
					ConfigMapKeyRef: &core.ConfigMapKeySelector{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{
 | 
						|
							Name: "$%^&*#",
 | 
						|
						},
 | 
						|
						Key: "some-key",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "missing FieldPath on ObjectFieldSelector",
 | 
						|
			envs: []core.EnvVar{{
 | 
						|
				Name: "abc",
 | 
						|
				ValueFrom: &core.EnvVarSource{
 | 
						|
					FieldRef: &core.ObjectFieldSelector{
 | 
						|
						APIVersion: legacyscheme.Registry.GroupOrDie(core.GroupName).GroupVersions[0].String(),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			expectedError: `[0].valueFrom.fieldRef.fieldPath: Required value`,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "missing APIVersion on ObjectFieldSelector",
 | 
						|
			envs: []core.EnvVar{{
 | 
						|
				Name: "abc",
 | 
						|
				ValueFrom: &core.EnvVarSource{
 | 
						|
					FieldRef: &core.ObjectFieldSelector{
 | 
						|
						FieldPath: "metadata.name",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			expectedError: `[0].valueFrom.fieldRef.apiVersion: Required value`,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid fieldPath",
 | 
						|
			envs: []core.EnvVar{{
 | 
						|
				Name: "abc",
 | 
						|
				ValueFrom: &core.EnvVarSource{
 | 
						|
					FieldRef: &core.ObjectFieldSelector{
 | 
						|
						FieldPath:  "metadata.whoops",
 | 
						|
						APIVersion: legacyscheme.Registry.GroupOrDie(core.GroupName).GroupVersions[0].String(),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			expectedError: `[0].valueFrom.fieldRef.fieldPath: Invalid value: "metadata.whoops": error converting fieldPath`,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "metadata.name with subscript",
 | 
						|
			envs: []core.EnvVar{{
 | 
						|
				Name: "labels",
 | 
						|
				ValueFrom: &core.EnvVarSource{
 | 
						|
					FieldRef: &core.ObjectFieldSelector{
 | 
						|
						FieldPath:  "metadata.name['key']",
 | 
						|
						APIVersion: "v1",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			expectedError: `[0].valueFrom.fieldRef.fieldPath: Invalid value: "metadata.name['key']": error converting fieldPath: field label does not support subscript`,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "metadata.labels without subscript",
 | 
						|
			envs: []core.EnvVar{{
 | 
						|
				Name: "labels",
 | 
						|
				ValueFrom: &core.EnvVarSource{
 | 
						|
					FieldRef: &core.ObjectFieldSelector{
 | 
						|
						FieldPath:  "metadata.labels",
 | 
						|
						APIVersion: "v1",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			expectedError: `[0].valueFrom.fieldRef.fieldPath: Unsupported value: "metadata.labels": supported values: "metadata.name", "metadata.namespace", "metadata.uid", "spec.nodeName", "spec.serviceAccountName", "status.hostIP", "status.podIP"`,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "metadata.annotations without subscript",
 | 
						|
			envs: []core.EnvVar{{
 | 
						|
				Name: "abc",
 | 
						|
				ValueFrom: &core.EnvVarSource{
 | 
						|
					FieldRef: &core.ObjectFieldSelector{
 | 
						|
						FieldPath:  "metadata.annotations",
 | 
						|
						APIVersion: "v1",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			expectedError: `[0].valueFrom.fieldRef.fieldPath: Unsupported value: "metadata.annotations": supported values: "metadata.name", "metadata.namespace", "metadata.uid", "spec.nodeName", "spec.serviceAccountName", "status.hostIP", "status.podIP"`,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "metadata.annotations with invalid key",
 | 
						|
			envs: []core.EnvVar{{
 | 
						|
				Name: "abc",
 | 
						|
				ValueFrom: &core.EnvVarSource{
 | 
						|
					FieldRef: &core.ObjectFieldSelector{
 | 
						|
						FieldPath:  "metadata.annotations['invalid~key']",
 | 
						|
						APIVersion: "v1",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			expectedError: `field[0].valueFrom.fieldRef: Invalid value: "invalid~key"`,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "metadata.labels with invalid key",
 | 
						|
			envs: []core.EnvVar{{
 | 
						|
				Name: "abc",
 | 
						|
				ValueFrom: &core.EnvVarSource{
 | 
						|
					FieldRef: &core.ObjectFieldSelector{
 | 
						|
						FieldPath:  "metadata.labels['Www.k8s.io/test']",
 | 
						|
						APIVersion: "v1",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			expectedError: `field[0].valueFrom.fieldRef: Invalid value: "Www.k8s.io/test"`,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "unsupported fieldPath",
 | 
						|
			envs: []core.EnvVar{{
 | 
						|
				Name: "abc",
 | 
						|
				ValueFrom: &core.EnvVarSource{
 | 
						|
					FieldRef: &core.ObjectFieldSelector{
 | 
						|
						FieldPath:  "status.phase",
 | 
						|
						APIVersion: legacyscheme.Registry.GroupOrDie(core.GroupName).GroupVersions[0].String(),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			expectedError: `valueFrom.fieldRef.fieldPath: Unsupported value: "status.phase": supported values: "metadata.name", "metadata.namespace", "metadata.uid", "spec.nodeName", "spec.serviceAccountName", "status.hostIP", "status.podIP"`,
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for _, tc := range errorCases {
 | 
						|
		if errs := ValidateEnv(tc.envs, field.NewPath("field")); len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure for %s", tc.name)
 | 
						|
		} else {
 | 
						|
			for i := range errs {
 | 
						|
				str := errs[i].Error()
 | 
						|
				if str != "" && !strings.Contains(str, tc.expectedError) {
 | 
						|
					t.Errorf("%s: expected error detail either empty or %q, got %q", tc.name, tc.expectedError, str)
 | 
						|
				}
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateEnvFrom(t *testing.T) {
 | 
						|
	successCase := []core.EnvFromSource{
 | 
						|
		{
 | 
						|
			ConfigMapRef: &core.ConfigMapEnvSource{
 | 
						|
				LocalObjectReference: core.LocalObjectReference{Name: "abc"},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Prefix: "pre_",
 | 
						|
			ConfigMapRef: &core.ConfigMapEnvSource{
 | 
						|
				LocalObjectReference: core.LocalObjectReference{Name: "abc"},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Prefix: "a.b",
 | 
						|
			ConfigMapRef: &core.ConfigMapEnvSource{
 | 
						|
				LocalObjectReference: core.LocalObjectReference{Name: "abc"},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			SecretRef: &core.SecretEnvSource{
 | 
						|
				LocalObjectReference: core.LocalObjectReference{Name: "abc"},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Prefix: "pre_",
 | 
						|
			SecretRef: &core.SecretEnvSource{
 | 
						|
				LocalObjectReference: core.LocalObjectReference{Name: "abc"},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Prefix: "a.b",
 | 
						|
			SecretRef: &core.SecretEnvSource{
 | 
						|
				LocalObjectReference: core.LocalObjectReference{Name: "abc"},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	if errs := ValidateEnvFrom(successCase, field.NewPath("field")); len(errs) != 0 {
 | 
						|
		t.Errorf("expected success: %v", errs)
 | 
						|
	}
 | 
						|
 | 
						|
	errorCases := []struct {
 | 
						|
		name          string
 | 
						|
		envs          []core.EnvFromSource
 | 
						|
		expectedError string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name: "zero-length name",
 | 
						|
			envs: []core.EnvFromSource{
 | 
						|
				{
 | 
						|
					ConfigMapRef: &core.ConfigMapEnvSource{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{Name: ""}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedError: "field[0].configMapRef.name: Required value",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid name",
 | 
						|
			envs: []core.EnvFromSource{
 | 
						|
				{
 | 
						|
					ConfigMapRef: &core.ConfigMapEnvSource{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{Name: "$"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedError: "field[0].configMapRef.name: Invalid value",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid prefix",
 | 
						|
			envs: []core.EnvFromSource{
 | 
						|
				{
 | 
						|
					Prefix: "a!b",
 | 
						|
					ConfigMapRef: &core.ConfigMapEnvSource{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{Name: "abc"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedError: `field[0].prefix: Invalid value: "a!b": ` + envVarNameErrMsg,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "zero-length name",
 | 
						|
			envs: []core.EnvFromSource{
 | 
						|
				{
 | 
						|
					SecretRef: &core.SecretEnvSource{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{Name: ""}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedError: "field[0].secretRef.name: Required value",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid name",
 | 
						|
			envs: []core.EnvFromSource{
 | 
						|
				{
 | 
						|
					SecretRef: &core.SecretEnvSource{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{Name: "&"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedError: "field[0].secretRef.name: Invalid value",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid prefix",
 | 
						|
			envs: []core.EnvFromSource{
 | 
						|
				{
 | 
						|
					Prefix: "a!b",
 | 
						|
					SecretRef: &core.SecretEnvSource{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{Name: "abc"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedError: `field[0].prefix: Invalid value: "a!b": ` + envVarNameErrMsg,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "no refs",
 | 
						|
			envs: []core.EnvFromSource{
 | 
						|
				{},
 | 
						|
			},
 | 
						|
			expectedError: "field: Invalid value: \"\": must specify one of: `configMapRef` or `secretRef`",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "multiple refs",
 | 
						|
			envs: []core.EnvFromSource{
 | 
						|
				{
 | 
						|
					SecretRef: &core.SecretEnvSource{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{Name: "abc"}},
 | 
						|
					ConfigMapRef: &core.ConfigMapEnvSource{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{Name: "abc"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedError: "field: Invalid value: \"\": may not have more than one field specified at a time",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid secret ref name",
 | 
						|
			envs: []core.EnvFromSource{
 | 
						|
				{
 | 
						|
					SecretRef: &core.SecretEnvSource{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{Name: "$%^&*#"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedError: "field[0].secretRef.name: Invalid value: \"$%^&*#\": " + dnsSubdomainLabelErrMsg,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid config ref name",
 | 
						|
			envs: []core.EnvFromSource{
 | 
						|
				{
 | 
						|
					ConfigMapRef: &core.ConfigMapEnvSource{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{Name: "$%^&*#"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedError: "field[0].configMapRef.name: Invalid value: \"$%^&*#\": " + dnsSubdomainLabelErrMsg,
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for _, tc := range errorCases {
 | 
						|
		if errs := ValidateEnvFrom(tc.envs, field.NewPath("field")); len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure for %s", tc.name)
 | 
						|
		} else {
 | 
						|
			for i := range errs {
 | 
						|
				str := errs[i].Error()
 | 
						|
				if str != "" && !strings.Contains(str, tc.expectedError) {
 | 
						|
					t.Errorf("%s: expected error detail either empty or %q, got %q", tc.name, tc.expectedError, str)
 | 
						|
				}
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateVolumeMounts(t *testing.T) {
 | 
						|
	volumes := []core.Volume{
 | 
						|
		{Name: "abc", VolumeSource: core.VolumeSource{PersistentVolumeClaim: &core.PersistentVolumeClaimVolumeSource{ClaimName: "testclaim1"}}},
 | 
						|
		{Name: "abc-123", VolumeSource: core.VolumeSource{PersistentVolumeClaim: &core.PersistentVolumeClaimVolumeSource{ClaimName: "testclaim2"}}},
 | 
						|
		{Name: "123", VolumeSource: core.VolumeSource{HostPath: &core.HostPathVolumeSource{Path: "/foo/baz", Type: newHostPathType(string(core.HostPathUnset))}}},
 | 
						|
	}
 | 
						|
	vols, v1err := ValidateVolumes(volumes, field.NewPath("field"))
 | 
						|
	if len(v1err) > 0 {
 | 
						|
		t.Errorf("Invalid test volume - expected success %v", v1err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	container := core.Container{
 | 
						|
		SecurityContext: nil,
 | 
						|
	}
 | 
						|
	propagation := core.MountPropagationBidirectional
 | 
						|
 | 
						|
	successCase := []core.VolumeMount{
 | 
						|
		{Name: "abc", MountPath: "/foo"},
 | 
						|
		{Name: "123", MountPath: "/bar"},
 | 
						|
		{Name: "abc-123", MountPath: "/baz"},
 | 
						|
		{Name: "abc-123", MountPath: "/baa", SubPath: ""},
 | 
						|
		{Name: "abc-123", MountPath: "/bab", SubPath: "baz"},
 | 
						|
		{Name: "abc-123", MountPath: "d:", SubPath: ""},
 | 
						|
		{Name: "abc-123", MountPath: "F:", SubPath: ""},
 | 
						|
		{Name: "abc-123", MountPath: "G:\\mount", SubPath: ""},
 | 
						|
		{Name: "abc-123", MountPath: "/bac", SubPath: ".baz"},
 | 
						|
		{Name: "abc-123", MountPath: "/bad", SubPath: "..baz"},
 | 
						|
	}
 | 
						|
	goodVolumeDevices := []core.VolumeDevice{
 | 
						|
		{Name: "xyz", DevicePath: "/foofoo"},
 | 
						|
		{Name: "uvw", DevicePath: "/foofoo/share/test"},
 | 
						|
	}
 | 
						|
	if errs := ValidateVolumeMounts(successCase, GetVolumeDeviceMap(goodVolumeDevices), vols, &container, field.NewPath("field")); len(errs) != 0 {
 | 
						|
		t.Errorf("expected success: %v", errs)
 | 
						|
	}
 | 
						|
 | 
						|
	errorCases := map[string][]core.VolumeMount{
 | 
						|
		"empty name":                             {{Name: "", MountPath: "/foo"}},
 | 
						|
		"name not found":                         {{Name: "", MountPath: "/foo"}},
 | 
						|
		"empty mountpath":                        {{Name: "abc", MountPath: ""}},
 | 
						|
		"mountpath collision":                    {{Name: "foo", MountPath: "/path/a"}, {Name: "bar", MountPath: "/path/a"}},
 | 
						|
		"absolute subpath":                       {{Name: "abc", MountPath: "/bar", SubPath: "/baz"}},
 | 
						|
		"subpath in ..":                          {{Name: "abc", MountPath: "/bar", SubPath: "../baz"}},
 | 
						|
		"subpath contains ..":                    {{Name: "abc", MountPath: "/bar", SubPath: "baz/../bat"}},
 | 
						|
		"subpath ends in ..":                     {{Name: "abc", MountPath: "/bar", SubPath: "./.."}},
 | 
						|
		"disabled MountPropagation feature gate": {{Name: "abc", MountPath: "/bar", MountPropagation: &propagation}},
 | 
						|
		"name exists in volumeDevice":            {{Name: "xyz", MountPath: "/bar"}},
 | 
						|
		"mountpath exists in volumeDevice":       {{Name: "uvw", MountPath: "/mnt/exists"}},
 | 
						|
		"both exist in volumeDevice":             {{Name: "xyz", MountPath: "/mnt/exists"}},
 | 
						|
	}
 | 
						|
	badVolumeDevice := []core.VolumeDevice{
 | 
						|
		{Name: "xyz", DevicePath: "/mnt/exists"},
 | 
						|
	}
 | 
						|
 | 
						|
	for k, v := range errorCases {
 | 
						|
		if errs := ValidateVolumeMounts(v, GetVolumeDeviceMap(badVolumeDevice), vols, &container, field.NewPath("field")); len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure for %s", k)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateDisabledSubpath(t *testing.T) {
 | 
						|
	utilfeature.DefaultFeatureGate.Set("VolumeSubpath=false")
 | 
						|
	defer utilfeature.DefaultFeatureGate.Set("VolumeSubpath=true")
 | 
						|
 | 
						|
	volumes := []core.Volume{
 | 
						|
		{Name: "abc", VolumeSource: core.VolumeSource{PersistentVolumeClaim: &core.PersistentVolumeClaimVolumeSource{ClaimName: "testclaim1"}}},
 | 
						|
		{Name: "abc-123", VolumeSource: core.VolumeSource{PersistentVolumeClaim: &core.PersistentVolumeClaimVolumeSource{ClaimName: "testclaim2"}}},
 | 
						|
		{Name: "123", VolumeSource: core.VolumeSource{HostPath: &core.HostPathVolumeSource{Path: "/foo/baz", Type: newHostPathType(string(core.HostPathUnset))}}},
 | 
						|
	}
 | 
						|
	vols, v1err := ValidateVolumes(volumes, field.NewPath("field"))
 | 
						|
	if len(v1err) > 0 {
 | 
						|
		t.Errorf("Invalid test volume - expected success %v", v1err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	container := core.Container{
 | 
						|
		SecurityContext: nil,
 | 
						|
	}
 | 
						|
 | 
						|
	goodVolumeDevices := []core.VolumeDevice{
 | 
						|
		{Name: "xyz", DevicePath: "/foofoo"},
 | 
						|
		{Name: "uvw", DevicePath: "/foofoo/share/test"},
 | 
						|
	}
 | 
						|
 | 
						|
	cases := map[string]struct {
 | 
						|
		mounts      []core.VolumeMount
 | 
						|
		expectError bool
 | 
						|
	}{
 | 
						|
		"subpath not specified": {
 | 
						|
			[]core.VolumeMount{
 | 
						|
				{
 | 
						|
					Name:      "abc-123",
 | 
						|
					MountPath: "/bab",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			false,
 | 
						|
		},
 | 
						|
		"subpath specified": {
 | 
						|
			[]core.VolumeMount{
 | 
						|
				{
 | 
						|
					Name:      "abc-123",
 | 
						|
					MountPath: "/bab",
 | 
						|
					SubPath:   "baz",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			true,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for name, test := range cases {
 | 
						|
		errs := ValidateVolumeMounts(test.mounts, GetVolumeDeviceMap(goodVolumeDevices), vols, &container, field.NewPath("field"))
 | 
						|
 | 
						|
		if len(errs) != 0 && !test.expectError {
 | 
						|
			t.Errorf("test %v failed: %+v", name, errs)
 | 
						|
		}
 | 
						|
 | 
						|
		if len(errs) == 0 && test.expectError {
 | 
						|
			t.Errorf("test %v failed, expected error", name)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateMountPropagation(t *testing.T) {
 | 
						|
	bTrue := true
 | 
						|
	bFalse := false
 | 
						|
	privilegedContainer := &core.Container{
 | 
						|
		SecurityContext: &core.SecurityContext{
 | 
						|
			Privileged: &bTrue,
 | 
						|
		},
 | 
						|
	}
 | 
						|
	nonPrivilegedContainer := &core.Container{
 | 
						|
		SecurityContext: &core.SecurityContext{
 | 
						|
			Privileged: &bFalse,
 | 
						|
		},
 | 
						|
	}
 | 
						|
	defaultContainer := &core.Container{}
 | 
						|
 | 
						|
	propagationBidirectional := core.MountPropagationBidirectional
 | 
						|
	propagationHostToContainer := core.MountPropagationHostToContainer
 | 
						|
	propagationNone := core.MountPropagationNone
 | 
						|
	propagationInvalid := core.MountPropagationMode("invalid")
 | 
						|
 | 
						|
	tests := []struct {
 | 
						|
		mount       core.VolumeMount
 | 
						|
		container   *core.Container
 | 
						|
		expectError bool
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			// implicitly non-privileged container + no propagation
 | 
						|
			core.VolumeMount{Name: "foo", MountPath: "/foo"},
 | 
						|
			defaultContainer,
 | 
						|
			false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			// implicitly non-privileged container + HostToContainer
 | 
						|
			core.VolumeMount{Name: "foo", MountPath: "/foo", MountPropagation: &propagationHostToContainer},
 | 
						|
			defaultContainer,
 | 
						|
			false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			// non-privileged container + None
 | 
						|
			core.VolumeMount{Name: "foo", MountPath: "/foo", MountPropagation: &propagationNone},
 | 
						|
			defaultContainer,
 | 
						|
			false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			// error: implicitly non-privileged container + Bidirectional
 | 
						|
			core.VolumeMount{Name: "foo", MountPath: "/foo", MountPropagation: &propagationBidirectional},
 | 
						|
			defaultContainer,
 | 
						|
			true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			// explicitly non-privileged container + no propagation
 | 
						|
			core.VolumeMount{Name: "foo", MountPath: "/foo"},
 | 
						|
			nonPrivilegedContainer,
 | 
						|
			false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			// explicitly non-privileged container + HostToContainer
 | 
						|
			core.VolumeMount{Name: "foo", MountPath: "/foo", MountPropagation: &propagationHostToContainer},
 | 
						|
			nonPrivilegedContainer,
 | 
						|
			false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			// explicitly non-privileged container + HostToContainer
 | 
						|
			core.VolumeMount{Name: "foo", MountPath: "/foo", MountPropagation: &propagationBidirectional},
 | 
						|
			nonPrivilegedContainer,
 | 
						|
			true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			// privileged container + no propagation
 | 
						|
			core.VolumeMount{Name: "foo", MountPath: "/foo"},
 | 
						|
			privilegedContainer,
 | 
						|
			false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			// privileged container + HostToContainer
 | 
						|
			core.VolumeMount{Name: "foo", MountPath: "/foo", MountPropagation: &propagationHostToContainer},
 | 
						|
			privilegedContainer,
 | 
						|
			false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			// privileged container + Bidirectional
 | 
						|
			core.VolumeMount{Name: "foo", MountPath: "/foo", MountPropagation: &propagationBidirectional},
 | 
						|
			privilegedContainer,
 | 
						|
			false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			// error: privileged container + invalid mount propagation
 | 
						|
			core.VolumeMount{Name: "foo", MountPath: "/foo", MountPropagation: &propagationInvalid},
 | 
						|
			privilegedContainer,
 | 
						|
			true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			// no container + Bidirectional
 | 
						|
			core.VolumeMount{Name: "foo", MountPath: "/foo", MountPropagation: &propagationBidirectional},
 | 
						|
			nil,
 | 
						|
			false,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	// Enable MountPropagation for this test
 | 
						|
	priorityEnabled := utilfeature.DefaultFeatureGate.Enabled("MountPropagation")
 | 
						|
	defer func() {
 | 
						|
		var err error
 | 
						|
		// restoring the old value
 | 
						|
		if priorityEnabled {
 | 
						|
			err = utilfeature.DefaultFeatureGate.Set("MountPropagation=true")
 | 
						|
		} else {
 | 
						|
			err = utilfeature.DefaultFeatureGate.Set("MountPropagation=false")
 | 
						|
		}
 | 
						|
		if err != nil {
 | 
						|
			t.Errorf("Failed to restore feature gate for MountPropagation: %v", err)
 | 
						|
		}
 | 
						|
	}()
 | 
						|
	err := utilfeature.DefaultFeatureGate.Set("MountPropagation=true")
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("Failed to enable feature gate for MountPropagation: %v", err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	volumes := []core.Volume{
 | 
						|
		{Name: "foo", VolumeSource: core.VolumeSource{HostPath: &core.HostPathVolumeSource{Path: "/foo/baz", Type: newHostPathType(string(core.HostPathUnset))}}},
 | 
						|
	}
 | 
						|
	vols2, v2err := ValidateVolumes(volumes, field.NewPath("field"))
 | 
						|
	if len(v2err) > 0 {
 | 
						|
		t.Errorf("Invalid test volume - expected success %v", v2err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	for i, test := range tests {
 | 
						|
		errs := ValidateVolumeMounts([]core.VolumeMount{test.mount}, nil, vols2, test.container, field.NewPath("field"))
 | 
						|
		if test.expectError && len(errs) == 0 {
 | 
						|
			t.Errorf("test %d expected error, got none", i)
 | 
						|
		}
 | 
						|
		if !test.expectError && len(errs) != 0 {
 | 
						|
			t.Errorf("test %d expected success, got error: %v", i, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestAlphaValidateVolumeDevices(t *testing.T) {
 | 
						|
	volumes := []core.Volume{
 | 
						|
		{Name: "abc", VolumeSource: core.VolumeSource{PersistentVolumeClaim: &core.PersistentVolumeClaimVolumeSource{ClaimName: "testclaim1"}}},
 | 
						|
		{Name: "abc-123", VolumeSource: core.VolumeSource{PersistentVolumeClaim: &core.PersistentVolumeClaimVolumeSource{ClaimName: "testclaim2"}}},
 | 
						|
		{Name: "def", VolumeSource: core.VolumeSource{HostPath: &core.HostPathVolumeSource{Path: "/foo/baz", Type: newHostPathType(string(core.HostPathUnset))}}},
 | 
						|
	}
 | 
						|
 | 
						|
	vols, v1err := ValidateVolumes(volumes, field.NewPath("field"))
 | 
						|
	if len(v1err) > 0 {
 | 
						|
		t.Errorf("Invalid test volumes - expected success %v", v1err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	disabledAlphaVolDevice := []core.VolumeDevice{
 | 
						|
		{Name: "abc", DevicePath: "/foo"},
 | 
						|
	}
 | 
						|
 | 
						|
	successCase := []core.VolumeDevice{
 | 
						|
		{Name: "abc", DevicePath: "/foo"},
 | 
						|
		{Name: "abc-123", DevicePath: "/usr/share/test"},
 | 
						|
	}
 | 
						|
	goodVolumeMounts := []core.VolumeMount{
 | 
						|
		{Name: "xyz", MountPath: "/foofoo"},
 | 
						|
		{Name: "ghi", MountPath: "/foo/usr/share/test"},
 | 
						|
	}
 | 
						|
 | 
						|
	errorCases := map[string][]core.VolumeDevice{
 | 
						|
		"empty name":                    {{Name: "", DevicePath: "/foo"}},
 | 
						|
		"duplicate name":                {{Name: "abc", DevicePath: "/foo"}, {Name: "abc", DevicePath: "/foo/bar"}},
 | 
						|
		"name not found":                {{Name: "not-found", DevicePath: "/usr/share/test"}},
 | 
						|
		"name found but invalid source": {{Name: "def", DevicePath: "/usr/share/test"}},
 | 
						|
		"empty devicepath":              {{Name: "abc", DevicePath: ""}},
 | 
						|
		"relative devicepath":           {{Name: "abc-123", DevicePath: "baz"}},
 | 
						|
		"duplicate devicepath":          {{Name: "abc", DevicePath: "/foo"}, {Name: "abc-123", DevicePath: "/foo"}},
 | 
						|
		"no backsteps":                  {{Name: "def", DevicePath: "/baz/../"}},
 | 
						|
		"name exists in volumemounts":   {{Name: "abc", DevicePath: "/baz/../"}},
 | 
						|
		"path exists in volumemounts":   {{Name: "xyz", DevicePath: "/this/path/exists"}},
 | 
						|
		"both exist in volumemounts":    {{Name: "abc", DevicePath: "/this/path/exists"}},
 | 
						|
	}
 | 
						|
	badVolumeMounts := []core.VolumeMount{
 | 
						|
		{Name: "abc", MountPath: "/foo"},
 | 
						|
		{Name: "abc-123", MountPath: "/this/path/exists"},
 | 
						|
	}
 | 
						|
 | 
						|
	// enable Alpha BlockVolume
 | 
						|
	err1 := utilfeature.DefaultFeatureGate.Set("BlockVolume=true")
 | 
						|
	if err1 != nil {
 | 
						|
		t.Errorf("Failed to enable feature gate for BlockVolume: %v", err1)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	// Success Cases:
 | 
						|
	// Validate normal success cases - only PVC volumeSource
 | 
						|
	if errs := ValidateVolumeDevices(successCase, GetVolumeMountMap(goodVolumeMounts), vols, field.NewPath("field")); len(errs) != 0 {
 | 
						|
		t.Errorf("expected success: %v", errs)
 | 
						|
	}
 | 
						|
 | 
						|
	// Error Cases:
 | 
						|
	// Validate normal error cases - only PVC volumeSource
 | 
						|
	for k, v := range errorCases {
 | 
						|
		if errs := ValidateVolumeDevices(v, GetVolumeMountMap(badVolumeMounts), vols, field.NewPath("field")); len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure for %s", k)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// disable Alpha BlockVolume
 | 
						|
	err2 := utilfeature.DefaultFeatureGate.Set("BlockVolume=false")
 | 
						|
	if err2 != nil {
 | 
						|
		t.Errorf("Failed to disable feature gate for BlockVolume: %v", err2)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	if errs := ValidateVolumeDevices(disabledAlphaVolDevice, GetVolumeMountMap(goodVolumeMounts), vols, field.NewPath("field")); len(errs) == 0 {
 | 
						|
		t.Errorf("expected failure: %v", errs)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateProbe(t *testing.T) {
 | 
						|
	handler := core.Handler{Exec: &core.ExecAction{Command: []string{"echo"}}}
 | 
						|
	// These fields must be positive.
 | 
						|
	positiveFields := [...]string{"InitialDelaySeconds", "TimeoutSeconds", "PeriodSeconds", "SuccessThreshold", "FailureThreshold"}
 | 
						|
	successCases := []*core.Probe{nil}
 | 
						|
	for _, field := range positiveFields {
 | 
						|
		probe := &core.Probe{Handler: handler}
 | 
						|
		reflect.ValueOf(probe).Elem().FieldByName(field).SetInt(10)
 | 
						|
		successCases = append(successCases, probe)
 | 
						|
	}
 | 
						|
 | 
						|
	for _, p := range successCases {
 | 
						|
		if errs := validateProbe(p, field.NewPath("field")); len(errs) != 0 {
 | 
						|
			t.Errorf("expected success: %v", errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	errorCases := []*core.Probe{{TimeoutSeconds: 10, InitialDelaySeconds: 10}}
 | 
						|
	for _, field := range positiveFields {
 | 
						|
		probe := &core.Probe{Handler: handler}
 | 
						|
		reflect.ValueOf(probe).Elem().FieldByName(field).SetInt(-10)
 | 
						|
		errorCases = append(errorCases, probe)
 | 
						|
	}
 | 
						|
	for _, p := range errorCases {
 | 
						|
		if errs := validateProbe(p, field.NewPath("field")); len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure for %v", p)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateHandler(t *testing.T) {
 | 
						|
	successCases := []core.Handler{
 | 
						|
		{Exec: &core.ExecAction{Command: []string{"echo"}}},
 | 
						|
		{HTTPGet: &core.HTTPGetAction{Path: "/", Port: intstr.FromInt(1), Host: "", Scheme: "HTTP"}},
 | 
						|
		{HTTPGet: &core.HTTPGetAction{Path: "/foo", Port: intstr.FromInt(65535), Host: "host", Scheme: "HTTP"}},
 | 
						|
		{HTTPGet: &core.HTTPGetAction{Path: "/", Port: intstr.FromString("port"), Host: "", Scheme: "HTTP"}},
 | 
						|
		{HTTPGet: &core.HTTPGetAction{Path: "/", Port: intstr.FromString("port"), Host: "", Scheme: "HTTP", HTTPHeaders: []core.HTTPHeader{{Name: "Host", Value: "foo.example.com"}}}},
 | 
						|
		{HTTPGet: &core.HTTPGetAction{Path: "/", Port: intstr.FromString("port"), Host: "", Scheme: "HTTP", HTTPHeaders: []core.HTTPHeader{{Name: "X-Forwarded-For", Value: "1.2.3.4"}, {Name: "X-Forwarded-For", Value: "5.6.7.8"}}}},
 | 
						|
	}
 | 
						|
	for _, h := range successCases {
 | 
						|
		if errs := validateHandler(&h, field.NewPath("field")); len(errs) != 0 {
 | 
						|
			t.Errorf("expected success: %v", errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	errorCases := []core.Handler{
 | 
						|
		{},
 | 
						|
		{Exec: &core.ExecAction{Command: []string{}}},
 | 
						|
		{HTTPGet: &core.HTTPGetAction{Path: "", Port: intstr.FromInt(0), Host: ""}},
 | 
						|
		{HTTPGet: &core.HTTPGetAction{Path: "/foo", Port: intstr.FromInt(65536), Host: "host"}},
 | 
						|
		{HTTPGet: &core.HTTPGetAction{Path: "", Port: intstr.FromString(""), Host: ""}},
 | 
						|
		{HTTPGet: &core.HTTPGetAction{Path: "/", Port: intstr.FromString("port"), Host: "", Scheme: "HTTP", HTTPHeaders: []core.HTTPHeader{{Name: "Host:", Value: "foo.example.com"}}}},
 | 
						|
		{HTTPGet: &core.HTTPGetAction{Path: "/", Port: intstr.FromString("port"), Host: "", Scheme: "HTTP", HTTPHeaders: []core.HTTPHeader{{Name: "X_Forwarded_For", Value: "foo.example.com"}}}},
 | 
						|
	}
 | 
						|
	for _, h := range errorCases {
 | 
						|
		if errs := validateHandler(&h, field.NewPath("field")); len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure for %#v", h)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidatePullPolicy(t *testing.T) {
 | 
						|
	type T struct {
 | 
						|
		Container      core.Container
 | 
						|
		ExpectedPolicy core.PullPolicy
 | 
						|
	}
 | 
						|
	testCases := map[string]T{
 | 
						|
		"NotPresent1": {
 | 
						|
			core.Container{Name: "abc", Image: "image:latest", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"},
 | 
						|
			core.PullIfNotPresent,
 | 
						|
		},
 | 
						|
		"NotPresent2": {
 | 
						|
			core.Container{Name: "abc1", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"},
 | 
						|
			core.PullIfNotPresent,
 | 
						|
		},
 | 
						|
		"Always1": {
 | 
						|
			core.Container{Name: "123", Image: "image:latest", ImagePullPolicy: "Always"},
 | 
						|
			core.PullAlways,
 | 
						|
		},
 | 
						|
		"Always2": {
 | 
						|
			core.Container{Name: "1234", Image: "image", ImagePullPolicy: "Always"},
 | 
						|
			core.PullAlways,
 | 
						|
		},
 | 
						|
		"Never1": {
 | 
						|
			core.Container{Name: "abc-123", Image: "image:latest", ImagePullPolicy: "Never"},
 | 
						|
			core.PullNever,
 | 
						|
		},
 | 
						|
		"Never2": {
 | 
						|
			core.Container{Name: "abc-1234", Image: "image", ImagePullPolicy: "Never"},
 | 
						|
			core.PullNever,
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for k, v := range testCases {
 | 
						|
		ctr := &v.Container
 | 
						|
		errs := validatePullPolicy(ctr.ImagePullPolicy, field.NewPath("field"))
 | 
						|
		if len(errs) != 0 {
 | 
						|
			t.Errorf("case[%s] expected success, got %#v", k, errs)
 | 
						|
		}
 | 
						|
		if ctr.ImagePullPolicy != v.ExpectedPolicy {
 | 
						|
			t.Errorf("case[%s] expected policy %v, got %v", k, v.ExpectedPolicy, ctr.ImagePullPolicy)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func getResourceLimits(cpu, memory string) core.ResourceList {
 | 
						|
	res := core.ResourceList{}
 | 
						|
	res[core.ResourceCPU] = resource.MustParse(cpu)
 | 
						|
	res[core.ResourceMemory] = resource.MustParse(memory)
 | 
						|
	return res
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateContainers(t *testing.T) {
 | 
						|
	volumeDevices := make(map[string]core.VolumeSource)
 | 
						|
	capabilities.SetForTests(capabilities.Capabilities{
 | 
						|
		AllowPrivileged: true,
 | 
						|
	})
 | 
						|
 | 
						|
	successCase := []core.Container{
 | 
						|
		{Name: "abc", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"},
 | 
						|
		// backwards compatibility to ensure containers in pod template spec do not check for this
 | 
						|
		{Name: "def", Image: " ", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"},
 | 
						|
		{Name: "ghi", Image: " some  ", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"},
 | 
						|
		{Name: "123", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"},
 | 
						|
		{Name: "abc-123", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"},
 | 
						|
		{
 | 
						|
			Name:  "life-123",
 | 
						|
			Image: "image",
 | 
						|
			Lifecycle: &core.Lifecycle{
 | 
						|
				PreStop: &core.Handler{
 | 
						|
					Exec: &core.ExecAction{Command: []string{"ls", "-l"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			ImagePullPolicy:          "IfNotPresent",
 | 
						|
			TerminationMessagePolicy: "File",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Name:  "resources-test",
 | 
						|
			Image: "image",
 | 
						|
			Resources: core.ResourceRequirements{
 | 
						|
				Limits: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("10G"),
 | 
						|
					core.ResourceName("my.org/resource"):   resource.MustParse("10"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
			ImagePullPolicy:          "IfNotPresent",
 | 
						|
			TerminationMessagePolicy: "File",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Name:  "resources-test-with-request-and-limit",
 | 
						|
			Image: "image",
 | 
						|
			Resources: core.ResourceRequirements{
 | 
						|
				Requests: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
				Limits: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
			ImagePullPolicy:          "IfNotPresent",
 | 
						|
			TerminationMessagePolicy: "File",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Name:  "resources-request-limit-simple",
 | 
						|
			Image: "image",
 | 
						|
			Resources: core.ResourceRequirements{
 | 
						|
				Requests: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU): resource.MustParse("8"),
 | 
						|
				},
 | 
						|
				Limits: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU): resource.MustParse("10"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
			ImagePullPolicy:          "IfNotPresent",
 | 
						|
			TerminationMessagePolicy: "File",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Name:  "resources-request-limit-edge",
 | 
						|
			Image: "image",
 | 
						|
			Resources: core.ResourceRequirements{
 | 
						|
				Requests: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("10G"),
 | 
						|
					core.ResourceName("my.org/resource"):   resource.MustParse("10"),
 | 
						|
				},
 | 
						|
				Limits: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("10G"),
 | 
						|
					core.ResourceName("my.org/resource"):   resource.MustParse("10"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
			ImagePullPolicy:          "IfNotPresent",
 | 
						|
			TerminationMessagePolicy: "File",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Name:  "resources-request-limit-partials",
 | 
						|
			Image: "image",
 | 
						|
			Resources: core.ResourceRequirements{
 | 
						|
				Requests: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("9.5"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
				Limits: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):  resource.MustParse("10"),
 | 
						|
					core.ResourceName("my.org/resource"): resource.MustParse("10"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
			ImagePullPolicy:          "IfNotPresent",
 | 
						|
			TerminationMessagePolicy: "File",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Name:  "resources-request",
 | 
						|
			Image: "image",
 | 
						|
			Resources: core.ResourceRequirements{
 | 
						|
				Requests: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("9.5"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
			ImagePullPolicy:          "IfNotPresent",
 | 
						|
			TerminationMessagePolicy: "File",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Name:  "same-host-port-different-protocol",
 | 
						|
			Image: "image",
 | 
						|
			Ports: []core.ContainerPort{
 | 
						|
				{ContainerPort: 80, HostPort: 80, Protocol: "TCP"},
 | 
						|
				{ContainerPort: 80, HostPort: 80, Protocol: "UDP"},
 | 
						|
			},
 | 
						|
			ImagePullPolicy:          "IfNotPresent",
 | 
						|
			TerminationMessagePolicy: "File",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Name:                     "fallback-to-logs-termination-message",
 | 
						|
			Image:                    "image",
 | 
						|
			ImagePullPolicy:          "IfNotPresent",
 | 
						|
			TerminationMessagePolicy: "FallbackToLogsOnError",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Name:                     "file-termination-message",
 | 
						|
			Image:                    "image",
 | 
						|
			ImagePullPolicy:          "IfNotPresent",
 | 
						|
			TerminationMessagePolicy: "File",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Name:                     "env-from-source",
 | 
						|
			Image:                    "image",
 | 
						|
			ImagePullPolicy:          "IfNotPresent",
 | 
						|
			TerminationMessagePolicy: "File",
 | 
						|
			EnvFrom: []core.EnvFromSource{
 | 
						|
				{
 | 
						|
					ConfigMapRef: &core.ConfigMapEnvSource{
 | 
						|
						LocalObjectReference: core.LocalObjectReference{
 | 
						|
							Name: "test",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{Name: "abc-1234", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File", SecurityContext: fakeValidSecurityContext(true)},
 | 
						|
	}
 | 
						|
	if errs := validateContainers(successCase, false, volumeDevices, field.NewPath("field")); len(errs) != 0 {
 | 
						|
		t.Errorf("expected success: %v", errs)
 | 
						|
	}
 | 
						|
 | 
						|
	capabilities.SetForTests(capabilities.Capabilities{
 | 
						|
		AllowPrivileged: false,
 | 
						|
	})
 | 
						|
	errorCases := map[string][]core.Container{
 | 
						|
		"zero-length name":     {{Name: "", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
		"zero-length-image":    {{Name: "abc", Image: "", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
		"name > 63 characters": {{Name: strings.Repeat("a", 64), Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
		"name not a DNS label": {{Name: "a.b.c", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
		"name not unique": {
 | 
						|
			{Name: "abc", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"},
 | 
						|
			{Name: "abc", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"},
 | 
						|
		},
 | 
						|
		"zero-length image": {{Name: "abc", Image: "", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
		"host port not unique": {
 | 
						|
			{Name: "abc", Image: "image", Ports: []core.ContainerPort{{ContainerPort: 80, HostPort: 80, Protocol: "TCP"}},
 | 
						|
				ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"},
 | 
						|
			{Name: "def", Image: "image", Ports: []core.ContainerPort{{ContainerPort: 81, HostPort: 80, Protocol: "TCP"}},
 | 
						|
				ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"},
 | 
						|
		},
 | 
						|
		"invalid env var name": {
 | 
						|
			{Name: "abc", Image: "image", Env: []core.EnvVar{{Name: "ev!1"}}, ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"},
 | 
						|
		},
 | 
						|
		"unknown volume name": {
 | 
						|
			{Name: "abc", Image: "image", VolumeMounts: []core.VolumeMount{{Name: "anything", MountPath: "/foo"}},
 | 
						|
				ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"},
 | 
						|
		},
 | 
						|
		"invalid lifecycle, no exec command.": {
 | 
						|
			{
 | 
						|
				Name:  "life-123",
 | 
						|
				Image: "image",
 | 
						|
				Lifecycle: &core.Lifecycle{
 | 
						|
					PreStop: &core.Handler{
 | 
						|
						Exec: &core.ExecAction{},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				ImagePullPolicy:          "IfNotPresent",
 | 
						|
				TerminationMessagePolicy: "File",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid lifecycle, no http path.": {
 | 
						|
			{
 | 
						|
				Name:  "life-123",
 | 
						|
				Image: "image",
 | 
						|
				Lifecycle: &core.Lifecycle{
 | 
						|
					PreStop: &core.Handler{
 | 
						|
						HTTPGet: &core.HTTPGetAction{},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				ImagePullPolicy:          "IfNotPresent",
 | 
						|
				TerminationMessagePolicy: "File",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid lifecycle, no tcp socket port.": {
 | 
						|
			{
 | 
						|
				Name:  "life-123",
 | 
						|
				Image: "image",
 | 
						|
				Lifecycle: &core.Lifecycle{
 | 
						|
					PreStop: &core.Handler{
 | 
						|
						TCPSocket: &core.TCPSocketAction{},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				ImagePullPolicy:          "IfNotPresent",
 | 
						|
				TerminationMessagePolicy: "File",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid lifecycle, zero tcp socket port.": {
 | 
						|
			{
 | 
						|
				Name:  "life-123",
 | 
						|
				Image: "image",
 | 
						|
				Lifecycle: &core.Lifecycle{
 | 
						|
					PreStop: &core.Handler{
 | 
						|
						TCPSocket: &core.TCPSocketAction{
 | 
						|
							Port: intstr.FromInt(0),
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				ImagePullPolicy:          "IfNotPresent",
 | 
						|
				TerminationMessagePolicy: "File",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid lifecycle, no action.": {
 | 
						|
			{
 | 
						|
				Name:  "life-123",
 | 
						|
				Image: "image",
 | 
						|
				Lifecycle: &core.Lifecycle{
 | 
						|
					PreStop: &core.Handler{},
 | 
						|
				},
 | 
						|
				ImagePullPolicy:          "IfNotPresent",
 | 
						|
				TerminationMessagePolicy: "File",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid liveness probe, no tcp socket port.": {
 | 
						|
			{
 | 
						|
				Name:  "life-123",
 | 
						|
				Image: "image",
 | 
						|
				LivenessProbe: &core.Probe{
 | 
						|
					Handler: core.Handler{
 | 
						|
						TCPSocket: &core.TCPSocketAction{},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				ImagePullPolicy:          "IfNotPresent",
 | 
						|
				TerminationMessagePolicy: "File",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid liveness probe, no action.": {
 | 
						|
			{
 | 
						|
				Name:  "life-123",
 | 
						|
				Image: "image",
 | 
						|
				LivenessProbe: &core.Probe{
 | 
						|
					Handler: core.Handler{},
 | 
						|
				},
 | 
						|
				ImagePullPolicy:          "IfNotPresent",
 | 
						|
				TerminationMessagePolicy: "File",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid message termination policy": {
 | 
						|
			{
 | 
						|
				Name:                     "life-123",
 | 
						|
				Image:                    "image",
 | 
						|
				ImagePullPolicy:          "IfNotPresent",
 | 
						|
				TerminationMessagePolicy: "Unknown",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"empty message termination policy": {
 | 
						|
			{
 | 
						|
				Name:                     "life-123",
 | 
						|
				Image:                    "image",
 | 
						|
				ImagePullPolicy:          "IfNotPresent",
 | 
						|
				TerminationMessagePolicy: "",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"privilege disabled": {
 | 
						|
			{Name: "abc", Image: "image", SecurityContext: fakeValidSecurityContext(true)},
 | 
						|
		},
 | 
						|
		"invalid compute resource": {
 | 
						|
			{
 | 
						|
				Name:  "abc-123",
 | 
						|
				Image: "image",
 | 
						|
				Resources: core.ResourceRequirements{
 | 
						|
					Limits: core.ResourceList{
 | 
						|
						"disk": resource.MustParse("10G"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
				ImagePullPolicy:          "IfNotPresent",
 | 
						|
				TerminationMessagePolicy: "File",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"Resource CPU invalid": {
 | 
						|
			{
 | 
						|
				Name:  "abc-123",
 | 
						|
				Image: "image",
 | 
						|
				Resources: core.ResourceRequirements{
 | 
						|
					Limits: getResourceLimits("-10", "0"),
 | 
						|
				},
 | 
						|
				ImagePullPolicy:          "IfNotPresent",
 | 
						|
				TerminationMessagePolicy: "File",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"Resource Requests CPU invalid": {
 | 
						|
			{
 | 
						|
				Name:  "abc-123",
 | 
						|
				Image: "image",
 | 
						|
				Resources: core.ResourceRequirements{
 | 
						|
					Requests: getResourceLimits("-10", "0"),
 | 
						|
				},
 | 
						|
				ImagePullPolicy:          "IfNotPresent",
 | 
						|
				TerminationMessagePolicy: "File",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"Resource Memory invalid": {
 | 
						|
			{
 | 
						|
				Name:  "abc-123",
 | 
						|
				Image: "image",
 | 
						|
				Resources: core.ResourceRequirements{
 | 
						|
					Limits: getResourceLimits("0", "-10"),
 | 
						|
				},
 | 
						|
				ImagePullPolicy:          "IfNotPresent",
 | 
						|
				TerminationMessagePolicy: "File",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"Request limit simple invalid": {
 | 
						|
			{
 | 
						|
				Name:  "abc-123",
 | 
						|
				Image: "image",
 | 
						|
				Resources: core.ResourceRequirements{
 | 
						|
					Limits:   getResourceLimits("5", "3"),
 | 
						|
					Requests: getResourceLimits("6", "3"),
 | 
						|
				},
 | 
						|
				ImagePullPolicy:          "IfNotPresent",
 | 
						|
				TerminationMessagePolicy: "File",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"Request limit multiple invalid": {
 | 
						|
			{
 | 
						|
				Name:  "abc-123",
 | 
						|
				Image: "image",
 | 
						|
				Resources: core.ResourceRequirements{
 | 
						|
					Limits:   getResourceLimits("5", "3"),
 | 
						|
					Requests: getResourceLimits("6", "4"),
 | 
						|
				},
 | 
						|
				ImagePullPolicy:          "IfNotPresent",
 | 
						|
				TerminationMessagePolicy: "File",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"Invalid env from": {
 | 
						|
			{
 | 
						|
				Name:                     "env-from-source",
 | 
						|
				Image:                    "image",
 | 
						|
				ImagePullPolicy:          "IfNotPresent",
 | 
						|
				TerminationMessagePolicy: "File",
 | 
						|
				EnvFrom: []core.EnvFromSource{
 | 
						|
					{
 | 
						|
						ConfigMapRef: &core.ConfigMapEnvSource{
 | 
						|
							LocalObjectReference: core.LocalObjectReference{
 | 
						|
								Name: "$%^&*#",
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for k, v := range errorCases {
 | 
						|
		if errs := validateContainers(v, false, volumeDevices, field.NewPath("field")); len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure for %s", k)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateInitContainers(t *testing.T) {
 | 
						|
	volumeDevices := make(map[string]core.VolumeSource)
 | 
						|
	capabilities.SetForTests(capabilities.Capabilities{
 | 
						|
		AllowPrivileged: true,
 | 
						|
	})
 | 
						|
 | 
						|
	successCase := []core.Container{
 | 
						|
		{
 | 
						|
			Name:  "container-1-same-host-port-different-protocol",
 | 
						|
			Image: "image",
 | 
						|
			Ports: []core.ContainerPort{
 | 
						|
				{ContainerPort: 80, HostPort: 80, Protocol: "TCP"},
 | 
						|
				{ContainerPort: 80, HostPort: 80, Protocol: "UDP"},
 | 
						|
			},
 | 
						|
			ImagePullPolicy:          "IfNotPresent",
 | 
						|
			TerminationMessagePolicy: "File",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Name:  "container-2-same-host-port-different-protocol",
 | 
						|
			Image: "image",
 | 
						|
			Ports: []core.ContainerPort{
 | 
						|
				{ContainerPort: 80, HostPort: 80, Protocol: "TCP"},
 | 
						|
				{ContainerPort: 80, HostPort: 80, Protocol: "UDP"},
 | 
						|
			},
 | 
						|
			ImagePullPolicy:          "IfNotPresent",
 | 
						|
			TerminationMessagePolicy: "File",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	if errs := validateContainers(successCase, true, volumeDevices, field.NewPath("field")); len(errs) != 0 {
 | 
						|
		t.Errorf("expected success: %v", errs)
 | 
						|
	}
 | 
						|
 | 
						|
	capabilities.SetForTests(capabilities.Capabilities{
 | 
						|
		AllowPrivileged: false,
 | 
						|
	})
 | 
						|
	errorCases := map[string][]core.Container{
 | 
						|
		"duplicate ports": {
 | 
						|
			{
 | 
						|
				Name:  "abc",
 | 
						|
				Image: "image",
 | 
						|
				Ports: []core.ContainerPort{
 | 
						|
					{
 | 
						|
						ContainerPort: 8080, HostPort: 8080, Protocol: "TCP",
 | 
						|
					},
 | 
						|
					{
 | 
						|
						ContainerPort: 8080, HostPort: 8080, Protocol: "TCP",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				ImagePullPolicy:          "IfNotPresent",
 | 
						|
				TerminationMessagePolicy: "File",
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for k, v := range errorCases {
 | 
						|
		if errs := validateContainers(v, true, volumeDevices, field.NewPath("field")); len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure for %s", k)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateRestartPolicy(t *testing.T) {
 | 
						|
	successCases := []core.RestartPolicy{
 | 
						|
		core.RestartPolicyAlways,
 | 
						|
		core.RestartPolicyOnFailure,
 | 
						|
		core.RestartPolicyNever,
 | 
						|
	}
 | 
						|
	for _, policy := range successCases {
 | 
						|
		if errs := validateRestartPolicy(&policy, field.NewPath("field")); len(errs) != 0 {
 | 
						|
			t.Errorf("expected success: %v", errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	errorCases := []core.RestartPolicy{"", "newpolicy"}
 | 
						|
 | 
						|
	for k, policy := range errorCases {
 | 
						|
		if errs := validateRestartPolicy(&policy, field.NewPath("field")); len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure for %d", k)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateDNSPolicy(t *testing.T) {
 | 
						|
	customDNSEnabled := utilfeature.DefaultFeatureGate.Enabled("CustomPodDNS")
 | 
						|
	defer func() {
 | 
						|
		// Restoring the old value.
 | 
						|
		if err := utilfeature.DefaultFeatureGate.Set(fmt.Sprintf("CustomPodDNS=%v", customDNSEnabled)); err != nil {
 | 
						|
			t.Errorf("Failed to restore CustomPodDNS feature gate: %v", err)
 | 
						|
		}
 | 
						|
	}()
 | 
						|
	if err := utilfeature.DefaultFeatureGate.Set("CustomPodDNS=true"); err != nil {
 | 
						|
		t.Errorf("Failed to enable CustomPodDNS feature gate: %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	successCases := []core.DNSPolicy{core.DNSClusterFirst, core.DNSDefault, core.DNSPolicy(core.DNSClusterFirst), core.DNSNone}
 | 
						|
	for _, policy := range successCases {
 | 
						|
		if errs := validateDNSPolicy(&policy, field.NewPath("field")); len(errs) != 0 {
 | 
						|
			t.Errorf("expected success: %v", errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	errorCases := []core.DNSPolicy{core.DNSPolicy("invalid")}
 | 
						|
	for _, policy := range errorCases {
 | 
						|
		if errs := validateDNSPolicy(&policy, field.NewPath("field")); len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure for %v", policy)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidatePodDNSConfig(t *testing.T) {
 | 
						|
	customDNSEnabled := utilfeature.DefaultFeatureGate.Enabled("CustomPodDNS")
 | 
						|
	defer func() {
 | 
						|
		// Restoring the old value.
 | 
						|
		if err := utilfeature.DefaultFeatureGate.Set(fmt.Sprintf("CustomPodDNS=%v", customDNSEnabled)); err != nil {
 | 
						|
			t.Errorf("Failed to restore CustomPodDNS feature gate: %v", err)
 | 
						|
		}
 | 
						|
	}()
 | 
						|
	if err := utilfeature.DefaultFeatureGate.Set("CustomPodDNS=true"); err != nil {
 | 
						|
		t.Errorf("Failed to enable CustomPodDNS feature gate: %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	generateTestSearchPathFunc := func(numChars int) string {
 | 
						|
		res := ""
 | 
						|
		for i := 0; i < numChars; i++ {
 | 
						|
			res = res + "a"
 | 
						|
		}
 | 
						|
		return res
 | 
						|
	}
 | 
						|
	testOptionValue := "2"
 | 
						|
	testDNSNone := core.DNSNone
 | 
						|
	testDNSClusterFirst := core.DNSClusterFirst
 | 
						|
 | 
						|
	testCases := []struct {
 | 
						|
		desc          string
 | 
						|
		dnsConfig     *core.PodDNSConfig
 | 
						|
		dnsPolicy     *core.DNSPolicy
 | 
						|
		expectedError bool
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			desc:          "valid: empty DNSConfig",
 | 
						|
			dnsConfig:     &core.PodDNSConfig{},
 | 
						|
			expectedError: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc: "valid: 1 option",
 | 
						|
			dnsConfig: &core.PodDNSConfig{
 | 
						|
				Options: []core.PodDNSConfigOption{
 | 
						|
					{Name: "ndots", Value: &testOptionValue},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedError: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc: "valid: 1 nameserver",
 | 
						|
			dnsConfig: &core.PodDNSConfig{
 | 
						|
				Nameservers: []string{"127.0.0.1"},
 | 
						|
			},
 | 
						|
			expectedError: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc: "valid: DNSNone with 1 nameserver",
 | 
						|
			dnsConfig: &core.PodDNSConfig{
 | 
						|
				Nameservers: []string{"127.0.0.1"},
 | 
						|
			},
 | 
						|
			dnsPolicy:     &testDNSNone,
 | 
						|
			expectedError: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc: "valid: 1 search path",
 | 
						|
			dnsConfig: &core.PodDNSConfig{
 | 
						|
				Searches: []string{"custom"},
 | 
						|
			},
 | 
						|
			expectedError: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc: "valid: 3 nameservers and 6 search paths",
 | 
						|
			dnsConfig: &core.PodDNSConfig{
 | 
						|
				Nameservers: []string{"127.0.0.1", "10.0.0.10", "8.8.8.8"},
 | 
						|
				Searches:    []string{"custom", "mydomain.com", "local", "cluster.local", "svc.cluster.local", "default.svc.cluster.local"},
 | 
						|
			},
 | 
						|
			expectedError: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc: "valid: 256 characters in search path list",
 | 
						|
			dnsConfig: &core.PodDNSConfig{
 | 
						|
				// We can have 256 - (6 - 1) = 251 characters in total for 6 search paths.
 | 
						|
				Searches: []string{
 | 
						|
					generateTestSearchPathFunc(1),
 | 
						|
					generateTestSearchPathFunc(50),
 | 
						|
					generateTestSearchPathFunc(50),
 | 
						|
					generateTestSearchPathFunc(50),
 | 
						|
					generateTestSearchPathFunc(50),
 | 
						|
					generateTestSearchPathFunc(50),
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedError: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc: "valid: ipv6 nameserver",
 | 
						|
			dnsConfig: &core.PodDNSConfig{
 | 
						|
				Nameservers: []string{"FE80::0202:B3FF:FE1E:8329"},
 | 
						|
			},
 | 
						|
			expectedError: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc: "invalid: 4 nameservers",
 | 
						|
			dnsConfig: &core.PodDNSConfig{
 | 
						|
				Nameservers: []string{"127.0.0.1", "10.0.0.10", "8.8.8.8", "1.2.3.4"},
 | 
						|
			},
 | 
						|
			expectedError: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc: "invalid: 7 search paths",
 | 
						|
			dnsConfig: &core.PodDNSConfig{
 | 
						|
				Searches: []string{"custom", "mydomain.com", "local", "cluster.local", "svc.cluster.local", "default.svc.cluster.local", "exceeded"},
 | 
						|
			},
 | 
						|
			expectedError: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc: "invalid: 257 characters in search path list",
 | 
						|
			dnsConfig: &core.PodDNSConfig{
 | 
						|
				// We can have 256 - (6 - 1) = 251 characters in total for 6 search paths.
 | 
						|
				Searches: []string{
 | 
						|
					generateTestSearchPathFunc(2),
 | 
						|
					generateTestSearchPathFunc(50),
 | 
						|
					generateTestSearchPathFunc(50),
 | 
						|
					generateTestSearchPathFunc(50),
 | 
						|
					generateTestSearchPathFunc(50),
 | 
						|
					generateTestSearchPathFunc(50),
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedError: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc: "invalid search path",
 | 
						|
			dnsConfig: &core.PodDNSConfig{
 | 
						|
				Searches: []string{"custom?"},
 | 
						|
			},
 | 
						|
			expectedError: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc: "invalid nameserver",
 | 
						|
			dnsConfig: &core.PodDNSConfig{
 | 
						|
				Nameservers: []string{"invalid"},
 | 
						|
			},
 | 
						|
			expectedError: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc: "invalid empty option name",
 | 
						|
			dnsConfig: &core.PodDNSConfig{
 | 
						|
				Options: []core.PodDNSConfigOption{
 | 
						|
					{Value: &testOptionValue},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedError: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc: "invalid: DNSNone with 0 nameserver",
 | 
						|
			dnsConfig: &core.PodDNSConfig{
 | 
						|
				Searches: []string{"custom"},
 | 
						|
			},
 | 
						|
			dnsPolicy:     &testDNSNone,
 | 
						|
			expectedError: true,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, tc := range testCases {
 | 
						|
		if tc.dnsPolicy == nil {
 | 
						|
			tc.dnsPolicy = &testDNSClusterFirst
 | 
						|
		}
 | 
						|
 | 
						|
		errs := validatePodDNSConfig(tc.dnsConfig, tc.dnsPolicy, field.NewPath("dnsConfig"))
 | 
						|
		if len(errs) != 0 && !tc.expectedError {
 | 
						|
			t.Errorf("%v: validatePodDNSConfig(%v) = %v, want nil", tc.desc, tc.dnsConfig, errs)
 | 
						|
		} else if len(errs) == 0 && tc.expectedError {
 | 
						|
			t.Errorf("%v: validatePodDNSConfig(%v) = nil, want error", tc.desc, tc.dnsConfig)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidatePodSpec(t *testing.T) {
 | 
						|
	activeDeadlineSeconds := int64(30)
 | 
						|
	activeDeadlineSecondsMax := int64(math.MaxInt32)
 | 
						|
 | 
						|
	minUserID := int64(0)
 | 
						|
	maxUserID := int64(2147483647)
 | 
						|
	minGroupID := int64(0)
 | 
						|
	maxGroupID := int64(2147483647)
 | 
						|
 | 
						|
	defer utilfeaturetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.PodPriority, true)()
 | 
						|
	defer utilfeaturetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.PodShareProcessNamespace, true)()
 | 
						|
 | 
						|
	successCases := []core.PodSpec{
 | 
						|
		{ // Populate basic fields, leave defaults for most.
 | 
						|
			Volumes:       []core.Volume{{Name: "vol", VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}}}},
 | 
						|
			Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
		},
 | 
						|
		{ // Populate all fields.
 | 
						|
			Volumes: []core.Volume{
 | 
						|
				{Name: "vol", VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}}},
 | 
						|
			},
 | 
						|
			Containers:     []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			InitContainers: []core.Container{{Name: "ictr", Image: "iimage", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			RestartPolicy:  core.RestartPolicyAlways,
 | 
						|
			NodeSelector: map[string]string{
 | 
						|
				"key": "value",
 | 
						|
			},
 | 
						|
			NodeName:              "foobar",
 | 
						|
			DNSPolicy:             core.DNSClusterFirst,
 | 
						|
			ActiveDeadlineSeconds: &activeDeadlineSeconds,
 | 
						|
			ServiceAccountName:    "acct",
 | 
						|
		},
 | 
						|
		{ // Populate all fields with larger active deadline.
 | 
						|
			Volumes: []core.Volume{
 | 
						|
				{Name: "vol", VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}}},
 | 
						|
			},
 | 
						|
			Containers:     []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			InitContainers: []core.Container{{Name: "ictr", Image: "iimage", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			RestartPolicy:  core.RestartPolicyAlways,
 | 
						|
			NodeSelector: map[string]string{
 | 
						|
				"key": "value",
 | 
						|
			},
 | 
						|
			NodeName:              "foobar",
 | 
						|
			DNSPolicy:             core.DNSClusterFirst,
 | 
						|
			ActiveDeadlineSeconds: &activeDeadlineSecondsMax,
 | 
						|
			ServiceAccountName:    "acct",
 | 
						|
		},
 | 
						|
		{ // Populate HostNetwork.
 | 
						|
			Containers: []core.Container{
 | 
						|
				{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File",
 | 
						|
					Ports: []core.ContainerPort{
 | 
						|
						{HostPort: 8080, ContainerPort: 8080, Protocol: "TCP"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			SecurityContext: &core.PodSecurityContext{
 | 
						|
				HostNetwork: true,
 | 
						|
			},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
		},
 | 
						|
		{ // Populate RunAsUser SupplementalGroups FSGroup with minID 0
 | 
						|
			Containers: []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			SecurityContext: &core.PodSecurityContext{
 | 
						|
				SupplementalGroups: []int64{minGroupID},
 | 
						|
				RunAsUser:          &minUserID,
 | 
						|
				FSGroup:            &minGroupID,
 | 
						|
			},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
		},
 | 
						|
		{ // Populate RunAsUser SupplementalGroups FSGroup with maxID 2147483647
 | 
						|
			Containers: []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			SecurityContext: &core.PodSecurityContext{
 | 
						|
				SupplementalGroups: []int64{maxGroupID},
 | 
						|
				RunAsUser:          &maxUserID,
 | 
						|
				FSGroup:            &maxGroupID,
 | 
						|
			},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
		},
 | 
						|
		{ // Populate HostIPC.
 | 
						|
			SecurityContext: &core.PodSecurityContext{
 | 
						|
				HostIPC: true,
 | 
						|
			},
 | 
						|
			Volumes:       []core.Volume{{Name: "vol", VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}}}},
 | 
						|
			Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
		},
 | 
						|
		{ // Populate HostPID.
 | 
						|
			SecurityContext: &core.PodSecurityContext{
 | 
						|
				HostPID: true,
 | 
						|
			},
 | 
						|
			Volumes:       []core.Volume{{Name: "vol", VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}}}},
 | 
						|
			Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
		},
 | 
						|
		{ // Populate Affinity.
 | 
						|
			Volumes:       []core.Volume{{Name: "vol", VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}}}},
 | 
						|
			Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
		},
 | 
						|
		{ // Populate HostAliases.
 | 
						|
			HostAliases:   []core.HostAlias{{IP: "12.34.56.78", Hostnames: []string{"host1", "host2"}}},
 | 
						|
			Volumes:       []core.Volume{{Name: "vol", VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}}}},
 | 
						|
			Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
		},
 | 
						|
		{ // Populate HostAliases with `foo.bar` hostnames.
 | 
						|
			HostAliases:   []core.HostAlias{{IP: "12.34.56.78", Hostnames: []string{"host1.foo", "host2.bar"}}},
 | 
						|
			Volumes:       []core.Volume{{Name: "vol", VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}}}},
 | 
						|
			Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
		},
 | 
						|
		{ // Populate HostAliases with HostNetwork.
 | 
						|
			HostAliases: []core.HostAlias{{IP: "12.34.56.78", Hostnames: []string{"host1.foo", "host2.bar"}}},
 | 
						|
			Containers:  []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			SecurityContext: &core.PodSecurityContext{
 | 
						|
				HostNetwork: true,
 | 
						|
			},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
		},
 | 
						|
		{ // Populate PriorityClassName.
 | 
						|
			Volumes:           []core.Volume{{Name: "vol", VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}}}},
 | 
						|
			Containers:        []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			RestartPolicy:     core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:         core.DNSClusterFirst,
 | 
						|
			PriorityClassName: "valid-name",
 | 
						|
		},
 | 
						|
		{ // Populate ShareProcessNamespace
 | 
						|
			Volumes:       []core.Volume{{Name: "vol", VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}}}},
 | 
						|
			Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
			SecurityContext: &core.PodSecurityContext{
 | 
						|
				ShareProcessNamespace: &[]bool{true}[0],
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for i := range successCases {
 | 
						|
		if errs := ValidatePodSpec(&successCases[i], field.NewPath("field")); len(errs) != 0 {
 | 
						|
			t.Errorf("expected success: %v", errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	activeDeadlineSeconds = int64(0)
 | 
						|
	activeDeadlineSecondsTooLarge := int64(math.MaxInt32 + 1)
 | 
						|
 | 
						|
	minUserID = int64(-1)
 | 
						|
	maxUserID = int64(2147483648)
 | 
						|
	minGroupID = int64(-1)
 | 
						|
	maxGroupID = int64(2147483648)
 | 
						|
 | 
						|
	failureCases := map[string]core.PodSpec{
 | 
						|
		"bad volume": {
 | 
						|
			Volumes:       []core.Volume{{}},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
			Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
		},
 | 
						|
		"no containers": {
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
		},
 | 
						|
		"bad container": {
 | 
						|
			Containers:    []core.Container{{}},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
		},
 | 
						|
		"bad init container": {
 | 
						|
			Containers:     []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			InitContainers: []core.Container{{}},
 | 
						|
			RestartPolicy:  core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:      core.DNSClusterFirst,
 | 
						|
		},
 | 
						|
		"bad DNS policy": {
 | 
						|
			DNSPolicy:     core.DNSPolicy("invalid"),
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
		},
 | 
						|
		"bad service account name": {
 | 
						|
			Containers:         []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			RestartPolicy:      core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:          core.DNSClusterFirst,
 | 
						|
			ServiceAccountName: "invalidName",
 | 
						|
		},
 | 
						|
		"bad restart policy": {
 | 
						|
			RestartPolicy: "UnknowPolicy",
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
			Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
		},
 | 
						|
		"with hostNetwork hostPort not equal to containerPort": {
 | 
						|
			Containers: []core.Container{
 | 
						|
				{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", Ports: []core.ContainerPort{
 | 
						|
					{HostPort: 8080, ContainerPort: 2600, Protocol: "TCP"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			SecurityContext: &core.PodSecurityContext{
 | 
						|
				HostNetwork: true,
 | 
						|
			},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
		},
 | 
						|
		"with hostAliases with invalid IP": {
 | 
						|
			SecurityContext: &core.PodSecurityContext{
 | 
						|
				HostNetwork: false,
 | 
						|
			},
 | 
						|
			HostAliases: []core.HostAlias{{IP: "999.999.999.999", Hostnames: []string{"host1", "host2"}}},
 | 
						|
		},
 | 
						|
		"with hostAliases with invalid hostname": {
 | 
						|
			SecurityContext: &core.PodSecurityContext{
 | 
						|
				HostNetwork: false,
 | 
						|
			},
 | 
						|
			HostAliases: []core.HostAlias{{IP: "12.34.56.78", Hostnames: []string{"@#$^#@#$"}}},
 | 
						|
		},
 | 
						|
		"bad supplementalGroups large than math.MaxInt32": {
 | 
						|
			Containers: []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			SecurityContext: &core.PodSecurityContext{
 | 
						|
				HostNetwork:        false,
 | 
						|
				SupplementalGroups: []int64{maxGroupID, 1234},
 | 
						|
			},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
		},
 | 
						|
		"bad supplementalGroups less than 0": {
 | 
						|
			Containers: []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			SecurityContext: &core.PodSecurityContext{
 | 
						|
				HostNetwork:        false,
 | 
						|
				SupplementalGroups: []int64{minGroupID, 1234},
 | 
						|
			},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
		},
 | 
						|
		"bad runAsUser large than math.MaxInt32": {
 | 
						|
			Containers: []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			SecurityContext: &core.PodSecurityContext{
 | 
						|
				HostNetwork: false,
 | 
						|
				RunAsUser:   &maxUserID,
 | 
						|
			},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
		},
 | 
						|
		"bad runAsUser less than 0": {
 | 
						|
			Containers: []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			SecurityContext: &core.PodSecurityContext{
 | 
						|
				HostNetwork: false,
 | 
						|
				RunAsUser:   &minUserID,
 | 
						|
			},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
		},
 | 
						|
		"bad fsGroup large than math.MaxInt32": {
 | 
						|
			Containers: []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			SecurityContext: &core.PodSecurityContext{
 | 
						|
				HostNetwork: false,
 | 
						|
				FSGroup:     &maxGroupID,
 | 
						|
			},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
		},
 | 
						|
		"bad fsGroup less than 0": {
 | 
						|
			Containers: []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			SecurityContext: &core.PodSecurityContext{
 | 
						|
				HostNetwork: false,
 | 
						|
				FSGroup:     &minGroupID,
 | 
						|
			},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
		},
 | 
						|
		"bad-active-deadline-seconds": {
 | 
						|
			Volumes: []core.Volume{
 | 
						|
				{Name: "vol", VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}}},
 | 
						|
			},
 | 
						|
			Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			NodeSelector: map[string]string{
 | 
						|
				"key": "value",
 | 
						|
			},
 | 
						|
			NodeName:              "foobar",
 | 
						|
			DNSPolicy:             core.DNSClusterFirst,
 | 
						|
			ActiveDeadlineSeconds: &activeDeadlineSeconds,
 | 
						|
		},
 | 
						|
		"active-deadline-seconds-too-large": {
 | 
						|
			Volumes: []core.Volume{
 | 
						|
				{Name: "vol", VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}}},
 | 
						|
			},
 | 
						|
			Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			NodeSelector: map[string]string{
 | 
						|
				"key": "value",
 | 
						|
			},
 | 
						|
			NodeName:              "foobar",
 | 
						|
			DNSPolicy:             core.DNSClusterFirst,
 | 
						|
			ActiveDeadlineSeconds: &activeDeadlineSecondsTooLarge,
 | 
						|
		},
 | 
						|
		"bad nodeName": {
 | 
						|
			NodeName:      "node name",
 | 
						|
			Volumes:       []core.Volume{{Name: "vol", VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}}}},
 | 
						|
			Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
		},
 | 
						|
		"bad PriorityClassName": {
 | 
						|
			Volumes:           []core.Volume{{Name: "vol", VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}}}},
 | 
						|
			Containers:        []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			RestartPolicy:     core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:         core.DNSClusterFirst,
 | 
						|
			PriorityClassName: "InvalidName",
 | 
						|
		},
 | 
						|
		"ShareProcessNamespace and HostPID both set": {
 | 
						|
			Volumes:       []core.Volume{{Name: "vol", VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}}}},
 | 
						|
			Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
			SecurityContext: &core.PodSecurityContext{
 | 
						|
				HostPID:               true,
 | 
						|
				ShareProcessNamespace: &[]bool{true}[0],
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for k, v := range failureCases {
 | 
						|
		if errs := ValidatePodSpec(&v, field.NewPath("field")); len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure for %q", k)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// original value will be restored by previous defer
 | 
						|
	utilfeaturetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.PodShareProcessNamespace, false)
 | 
						|
 | 
						|
	featuregatedCases := map[string]core.PodSpec{
 | 
						|
		"set ShareProcessNamespace": {
 | 
						|
			Volumes:       []core.Volume{{Name: "vol", VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}}}},
 | 
						|
			Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
			SecurityContext: &core.PodSecurityContext{
 | 
						|
				ShareProcessNamespace: &[]bool{true}[0],
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for k, v := range featuregatedCases {
 | 
						|
		if errs := ValidatePodSpec(&v, field.NewPath("field")); len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure due to gated feature: %q", k)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func extendPodSpecwithTolerations(in core.PodSpec, tolerations []core.Toleration) core.PodSpec {
 | 
						|
	var out core.PodSpec
 | 
						|
	out.Containers = in.Containers
 | 
						|
	out.RestartPolicy = in.RestartPolicy
 | 
						|
	out.DNSPolicy = in.DNSPolicy
 | 
						|
	out.Tolerations = tolerations
 | 
						|
	return out
 | 
						|
}
 | 
						|
 | 
						|
func TestValidatePod(t *testing.T) {
 | 
						|
	validPodSpec := func(affinity *core.Affinity) core.PodSpec {
 | 
						|
		spec := core.PodSpec{
 | 
						|
			Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			RestartPolicy: core.RestartPolicyAlways,
 | 
						|
			DNSPolicy:     core.DNSClusterFirst,
 | 
						|
		}
 | 
						|
		if affinity != nil {
 | 
						|
			spec.Affinity = affinity
 | 
						|
		}
 | 
						|
		return spec
 | 
						|
	}
 | 
						|
 | 
						|
	successCases := []core.Pod{
 | 
						|
		{ // Basic fields.
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "123", Namespace: "ns"},
 | 
						|
			Spec: core.PodSpec{
 | 
						|
				Volumes:       []core.Volume{{Name: "vol", VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}}}},
 | 
						|
				Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
				RestartPolicy: core.RestartPolicyAlways,
 | 
						|
				DNSPolicy:     core.DNSClusterFirst,
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{ // Just about everything.
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "abc.123.do-re-mi", Namespace: "ns"},
 | 
						|
			Spec: core.PodSpec{
 | 
						|
				Volumes: []core.Volume{
 | 
						|
					{Name: "vol", VolumeSource: core.VolumeSource{EmptyDir: &core.EmptyDirVolumeSource{}}},
 | 
						|
				},
 | 
						|
				Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
				RestartPolicy: core.RestartPolicyAlways,
 | 
						|
				DNSPolicy:     core.DNSClusterFirst,
 | 
						|
				NodeSelector: map[string]string{
 | 
						|
					"key": "value",
 | 
						|
				},
 | 
						|
				NodeName: "foobar",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{ // Serialized node affinity requirements.
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "123",
 | 
						|
				Namespace: "ns",
 | 
						|
			},
 | 
						|
			Spec: validPodSpec(
 | 
						|
				// TODO: Uncomment and move this block and move inside NodeAffinity once
 | 
						|
				// RequiredDuringSchedulingRequiredDuringExecution is implemented
 | 
						|
				//		RequiredDuringSchedulingRequiredDuringExecution: &core.NodeSelector{
 | 
						|
				//			NodeSelectorTerms: []core.NodeSelectorTerm{
 | 
						|
				//				{
 | 
						|
				//					MatchExpressions: []core.NodeSelectorRequirement{
 | 
						|
				//						{
 | 
						|
				//							Key: "key1",
 | 
						|
				//							Operator: core.NodeSelectorOpExists
 | 
						|
				//						},
 | 
						|
				//					},
 | 
						|
				//				},
 | 
						|
				//			},
 | 
						|
				//		},
 | 
						|
				&core.Affinity{
 | 
						|
					NodeAffinity: &core.NodeAffinity{
 | 
						|
						RequiredDuringSchedulingIgnoredDuringExecution: &core.NodeSelector{
 | 
						|
							NodeSelectorTerms: []core.NodeSelectorTerm{
 | 
						|
								{
 | 
						|
									MatchExpressions: []core.NodeSelectorRequirement{
 | 
						|
										{
 | 
						|
											Key:      "key2",
 | 
						|
											Operator: core.NodeSelectorOpIn,
 | 
						|
											Values:   []string{"value1", "value2"},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									MatchFields: []core.NodeSelectorRequirement{
 | 
						|
										{
 | 
						|
											Key:      "metadata.name",
 | 
						|
											Operator: core.NodeSelectorOpIn,
 | 
						|
											Values:   []string{"host1"},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
						PreferredDuringSchedulingIgnoredDuringExecution: []core.PreferredSchedulingTerm{
 | 
						|
							{
 | 
						|
								Weight: 10,
 | 
						|
								Preference: core.NodeSelectorTerm{
 | 
						|
									MatchExpressions: []core.NodeSelectorRequirement{
 | 
						|
										{
 | 
						|
											Key:      "foo",
 | 
						|
											Operator: core.NodeSelectorOpIn,
 | 
						|
											Values:   []string{"bar"},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			),
 | 
						|
		},
 | 
						|
		{ // Serialized node affinity requirements.
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "123",
 | 
						|
				Namespace: "ns",
 | 
						|
			},
 | 
						|
			Spec: validPodSpec(
 | 
						|
				// TODO: Uncomment and move this block and move inside NodeAffinity once
 | 
						|
				// RequiredDuringSchedulingRequiredDuringExecution is implemented
 | 
						|
				//		RequiredDuringSchedulingRequiredDuringExecution: &core.NodeSelector{
 | 
						|
				//			NodeSelectorTerms: []core.NodeSelectorTerm{
 | 
						|
				//				{
 | 
						|
				//					MatchExpressions: []core.NodeSelectorRequirement{
 | 
						|
				//						{
 | 
						|
				//							Key: "key1",
 | 
						|
				//							Operator: core.NodeSelectorOpExists
 | 
						|
				//						},
 | 
						|
				//					},
 | 
						|
				//				},
 | 
						|
				//			},
 | 
						|
				//		},
 | 
						|
				&core.Affinity{
 | 
						|
					NodeAffinity: &core.NodeAffinity{
 | 
						|
						RequiredDuringSchedulingIgnoredDuringExecution: &core.NodeSelector{
 | 
						|
							NodeSelectorTerms: []core.NodeSelectorTerm{
 | 
						|
								{
 | 
						|
									MatchExpressions: []core.NodeSelectorRequirement{},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
						PreferredDuringSchedulingIgnoredDuringExecution: []core.PreferredSchedulingTerm{
 | 
						|
							{
 | 
						|
								Weight: 10,
 | 
						|
								Preference: core.NodeSelectorTerm{
 | 
						|
									MatchExpressions: []core.NodeSelectorRequirement{},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			),
 | 
						|
		},
 | 
						|
		{ // Serialized pod affinity in affinity requirements in annotations.
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "123",
 | 
						|
				Namespace: "ns",
 | 
						|
				// TODO: Uncomment and move this block into Annotations map once
 | 
						|
				// RequiredDuringSchedulingRequiredDuringExecution is implemented
 | 
						|
				//		"requiredDuringSchedulingRequiredDuringExecution": [{
 | 
						|
				//			"labelSelector": {
 | 
						|
				//				"matchExpressions": [{
 | 
						|
				//					"key": "key2",
 | 
						|
				//					"operator": "In",
 | 
						|
				//					"values": ["value1", "value2"]
 | 
						|
				//				}]
 | 
						|
				//			},
 | 
						|
				//			"namespaces":["ns"],
 | 
						|
				//			"topologyKey": "zone"
 | 
						|
				//		}]
 | 
						|
			},
 | 
						|
			Spec: validPodSpec(&core.Affinity{
 | 
						|
				PodAffinity: &core.PodAffinity{
 | 
						|
					RequiredDuringSchedulingIgnoredDuringExecution: []core.PodAffinityTerm{
 | 
						|
						{
 | 
						|
							LabelSelector: &metav1.LabelSelector{
 | 
						|
								MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
									{
 | 
						|
										Key:      "key2",
 | 
						|
										Operator: metav1.LabelSelectorOpIn,
 | 
						|
										Values:   []string{"value1", "value2"},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
							TopologyKey: "zone",
 | 
						|
							Namespaces:  []string{"ns"},
 | 
						|
						},
 | 
						|
					},
 | 
						|
					PreferredDuringSchedulingIgnoredDuringExecution: []core.WeightedPodAffinityTerm{
 | 
						|
						{
 | 
						|
							Weight: 10,
 | 
						|
							PodAffinityTerm: core.PodAffinityTerm{
 | 
						|
								LabelSelector: &metav1.LabelSelector{
 | 
						|
									MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
										{
 | 
						|
											Key:      "key2",
 | 
						|
											Operator: metav1.LabelSelectorOpNotIn,
 | 
						|
											Values:   []string{"value1", "value2"},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
								Namespaces:  []string{"ns"},
 | 
						|
								TopologyKey: "region",
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		{ // Serialized pod anti affinity with different Label Operators in affinity requirements in annotations.
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "123",
 | 
						|
				Namespace: "ns",
 | 
						|
				// TODO: Uncomment and move this block into Annotations map once
 | 
						|
				// RequiredDuringSchedulingRequiredDuringExecution is implemented
 | 
						|
				//		"requiredDuringSchedulingRequiredDuringExecution": [{
 | 
						|
				//			"labelSelector": {
 | 
						|
				//				"matchExpressions": [{
 | 
						|
				//					"key": "key2",
 | 
						|
				//					"operator": "In",
 | 
						|
				//					"values": ["value1", "value2"]
 | 
						|
				//				}]
 | 
						|
				//			},
 | 
						|
				//			"namespaces":["ns"],
 | 
						|
				//			"topologyKey": "zone"
 | 
						|
				//		}]
 | 
						|
			},
 | 
						|
			Spec: validPodSpec(&core.Affinity{
 | 
						|
				PodAntiAffinity: &core.PodAntiAffinity{
 | 
						|
					RequiredDuringSchedulingIgnoredDuringExecution: []core.PodAffinityTerm{
 | 
						|
						{
 | 
						|
							LabelSelector: &metav1.LabelSelector{
 | 
						|
								MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
									{
 | 
						|
										Key:      "key2",
 | 
						|
										Operator: metav1.LabelSelectorOpExists,
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
							TopologyKey: "zone",
 | 
						|
							Namespaces:  []string{"ns"},
 | 
						|
						},
 | 
						|
					},
 | 
						|
					PreferredDuringSchedulingIgnoredDuringExecution: []core.WeightedPodAffinityTerm{
 | 
						|
						{
 | 
						|
							Weight: 10,
 | 
						|
							PodAffinityTerm: core.PodAffinityTerm{
 | 
						|
								LabelSelector: &metav1.LabelSelector{
 | 
						|
									MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
										{
 | 
						|
											Key:      "key2",
 | 
						|
											Operator: metav1.LabelSelectorOpDoesNotExist,
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
								Namespaces:  []string{"ns"},
 | 
						|
								TopologyKey: "region",
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		{ // populate forgiveness tolerations with exists operator in annotations.
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "123",
 | 
						|
				Namespace: "ns",
 | 
						|
			},
 | 
						|
			Spec: extendPodSpecwithTolerations(validPodSpec(nil), []core.Toleration{{Key: "foo", Operator: "Exists", Value: "", Effect: "NoExecute", TolerationSeconds: &[]int64{60}[0]}}),
 | 
						|
		},
 | 
						|
		{ // populate forgiveness tolerations with equal operator in annotations.
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "123",
 | 
						|
				Namespace: "ns",
 | 
						|
			},
 | 
						|
			Spec: extendPodSpecwithTolerations(validPodSpec(nil), []core.Toleration{{Key: "foo", Operator: "Equal", Value: "bar", Effect: "NoExecute", TolerationSeconds: &[]int64{60}[0]}}),
 | 
						|
		},
 | 
						|
		{ // populate tolerations equal operator in annotations.
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "123",
 | 
						|
				Namespace: "ns",
 | 
						|
			},
 | 
						|
			Spec: extendPodSpecwithTolerations(validPodSpec(nil), []core.Toleration{{Key: "foo", Operator: "Equal", Value: "bar", Effect: "NoSchedule"}}),
 | 
						|
		},
 | 
						|
		{ // populate tolerations exists operator in annotations.
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "123",
 | 
						|
				Namespace: "ns",
 | 
						|
			},
 | 
						|
			Spec: validPodSpec(nil),
 | 
						|
		},
 | 
						|
		{ // empty key with Exists operator is OK for toleration, empty toleration key means match all taint keys.
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "123",
 | 
						|
				Namespace: "ns",
 | 
						|
			},
 | 
						|
			Spec: extendPodSpecwithTolerations(validPodSpec(nil), []core.Toleration{{Operator: "Exists", Effect: "NoSchedule"}}),
 | 
						|
		},
 | 
						|
		{ // empty operator is OK for toleration, defaults to Equal.
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "123",
 | 
						|
				Namespace: "ns",
 | 
						|
			},
 | 
						|
			Spec: extendPodSpecwithTolerations(validPodSpec(nil), []core.Toleration{{Key: "foo", Value: "bar", Effect: "NoSchedule"}}),
 | 
						|
		},
 | 
						|
		{ // empty effect is OK for toleration, empty toleration effect means match all taint effects.
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "123",
 | 
						|
				Namespace: "ns",
 | 
						|
			},
 | 
						|
			Spec: extendPodSpecwithTolerations(validPodSpec(nil), []core.Toleration{{Key: "foo", Operator: "Equal", Value: "bar"}}),
 | 
						|
		},
 | 
						|
		{ // negative tolerationSeconds is OK for toleration.
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "pod-forgiveness-invalid",
 | 
						|
				Namespace: "ns",
 | 
						|
			},
 | 
						|
			Spec: extendPodSpecwithTolerations(validPodSpec(nil), []core.Toleration{{Key: "node.kubernetes.io/not-ready", Operator: "Exists", Effect: "NoExecute", TolerationSeconds: &[]int64{-2}[0]}}),
 | 
						|
		},
 | 
						|
		{ // docker default seccomp profile
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "123",
 | 
						|
				Namespace: "ns",
 | 
						|
				Annotations: map[string]string{
 | 
						|
					core.SeccompPodAnnotationKey: "docker/default",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Spec: validPodSpec(nil),
 | 
						|
		},
 | 
						|
		{ // unconfined seccomp profile
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "123",
 | 
						|
				Namespace: "ns",
 | 
						|
				Annotations: map[string]string{
 | 
						|
					core.SeccompPodAnnotationKey: "unconfined",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Spec: validPodSpec(nil),
 | 
						|
		},
 | 
						|
		{ // localhost seccomp profile
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "123",
 | 
						|
				Namespace: "ns",
 | 
						|
				Annotations: map[string]string{
 | 
						|
					core.SeccompPodAnnotationKey: "localhost/foo",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Spec: validPodSpec(nil),
 | 
						|
		},
 | 
						|
		{ // localhost seccomp profile for a container
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "123",
 | 
						|
				Namespace: "ns",
 | 
						|
				Annotations: map[string]string{
 | 
						|
					core.SeccompContainerAnnotationKeyPrefix + "foo": "localhost/foo",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Spec: validPodSpec(nil),
 | 
						|
		},
 | 
						|
		{ // default AppArmor profile for a container
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "123",
 | 
						|
				Namespace: "ns",
 | 
						|
				Annotations: map[string]string{
 | 
						|
					apparmor.ContainerAnnotationKeyPrefix + "ctr": apparmor.ProfileRuntimeDefault,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Spec: validPodSpec(nil),
 | 
						|
		},
 | 
						|
		{ // default AppArmor profile for an init container
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "123",
 | 
						|
				Namespace: "ns",
 | 
						|
				Annotations: map[string]string{
 | 
						|
					apparmor.ContainerAnnotationKeyPrefix + "init-ctr": apparmor.ProfileRuntimeDefault,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Spec: core.PodSpec{
 | 
						|
				InitContainers: []core.Container{{Name: "init-ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
				Containers:     []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
				RestartPolicy:  core.RestartPolicyAlways,
 | 
						|
				DNSPolicy:      core.DNSClusterFirst,
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{ // localhost AppArmor profile for a container
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "123",
 | 
						|
				Namespace: "ns",
 | 
						|
				Annotations: map[string]string{
 | 
						|
					apparmor.ContainerAnnotationKeyPrefix + "ctr": apparmor.ProfileNamePrefix + "foo",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Spec: validPodSpec(nil),
 | 
						|
		},
 | 
						|
		{ // syntactically valid sysctls
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "123",
 | 
						|
				Namespace: "ns",
 | 
						|
				Annotations: map[string]string{
 | 
						|
					core.SysctlsPodAnnotationKey:       "kernel.shmmni=32768,kernel.shmmax=1000000000",
 | 
						|
					core.UnsafeSysctlsPodAnnotationKey: "knet.ipv4.route.min_pmtu=1000",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Spec: validPodSpec(nil),
 | 
						|
		},
 | 
						|
		{ // valid extended resources for init container
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "valid-extended", Namespace: "ns"},
 | 
						|
			Spec: core.PodSpec{
 | 
						|
				InitContainers: []core.Container{
 | 
						|
					{
 | 
						|
						Name:            "valid-extended",
 | 
						|
						Image:           "image",
 | 
						|
						ImagePullPolicy: "IfNotPresent",
 | 
						|
						Resources: core.ResourceRequirements{
 | 
						|
							Requests: core.ResourceList{
 | 
						|
								core.ResourceName("example.com/a"): resource.MustParse("10"),
 | 
						|
							},
 | 
						|
							Limits: core.ResourceList{
 | 
						|
								core.ResourceName("example.com/a"): resource.MustParse("10"),
 | 
						|
							},
 | 
						|
						},
 | 
						|
						TerminationMessagePolicy: "File",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
				RestartPolicy: core.RestartPolicyAlways,
 | 
						|
				DNSPolicy:     core.DNSClusterFirst,
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{ // valid extended resources for regular container
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "valid-extended", Namespace: "ns"},
 | 
						|
			Spec: core.PodSpec{
 | 
						|
				InitContainers: []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
				Containers: []core.Container{
 | 
						|
					{
 | 
						|
						Name:            "valid-extended",
 | 
						|
						Image:           "image",
 | 
						|
						ImagePullPolicy: "IfNotPresent",
 | 
						|
						Resources: core.ResourceRequirements{
 | 
						|
							Requests: core.ResourceList{
 | 
						|
								core.ResourceName("example.com/a"): resource.MustParse("10"),
 | 
						|
							},
 | 
						|
							Limits: core.ResourceList{
 | 
						|
								core.ResourceName("example.com/a"): resource.MustParse("10"),
 | 
						|
							},
 | 
						|
						},
 | 
						|
						TerminationMessagePolicy: "File",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				RestartPolicy: core.RestartPolicyAlways,
 | 
						|
				DNSPolicy:     core.DNSClusterFirst,
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for _, pod := range successCases {
 | 
						|
		if errs := ValidatePod(&pod); len(errs) != 0 {
 | 
						|
			t.Errorf("expected success: %v", errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	errorCases := map[string]struct {
 | 
						|
		spec          core.Pod
 | 
						|
		expectedError string
 | 
						|
	}{
 | 
						|
		"bad name": {
 | 
						|
			expectedError: "metadata.name",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "", Namespace: "ns"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					RestartPolicy: core.RestartPolicyAlways,
 | 
						|
					DNSPolicy:     core.DNSClusterFirst,
 | 
						|
					Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"image whitespace": {
 | 
						|
			expectedError: "spec.containers[0].image",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "ns"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					RestartPolicy: core.RestartPolicyAlways,
 | 
						|
					DNSPolicy:     core.DNSClusterFirst,
 | 
						|
					Containers:    []core.Container{{Name: "ctr", Image: " ", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"image leading and trailing whitespace": {
 | 
						|
			expectedError: "spec.containers[0].image",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "ns"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					RestartPolicy: core.RestartPolicyAlways,
 | 
						|
					DNSPolicy:     core.DNSClusterFirst,
 | 
						|
					Containers:    []core.Container{{Name: "ctr", Image: " something ", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"bad namespace": {
 | 
						|
			expectedError: "metadata.namespace",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: ""},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					RestartPolicy: core.RestartPolicyAlways,
 | 
						|
					DNSPolicy:     core.DNSClusterFirst,
 | 
						|
					Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"bad spec": {
 | 
						|
			expectedError: "spec.containers[0].name",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "ns"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					Containers: []core.Container{{}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"bad label": {
 | 
						|
			expectedError: "NoUppercaseOrSpecialCharsLike=Equals",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "abc",
 | 
						|
					Namespace: "ns",
 | 
						|
					Labels: map[string]string{
 | 
						|
						"NoUppercaseOrSpecialCharsLike=Equals": "bar",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					RestartPolicy: core.RestartPolicyAlways,
 | 
						|
					DNSPolicy:     core.DNSClusterFirst,
 | 
						|
					Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid node selector requirement in node affinity, operator can't be null": {
 | 
						|
			expectedError: "spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms[0].matchExpressions[0].operator",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(&core.Affinity{
 | 
						|
					NodeAffinity: &core.NodeAffinity{
 | 
						|
						RequiredDuringSchedulingIgnoredDuringExecution: &core.NodeSelector{
 | 
						|
							NodeSelectorTerms: []core.NodeSelectorTerm{
 | 
						|
								{
 | 
						|
									MatchExpressions: []core.NodeSelectorRequirement{
 | 
						|
										{
 | 
						|
											Key: "key1",
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid node selector requirement in node affinity, key is invalid": {
 | 
						|
			expectedError: "spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms[0].matchExpressions[0].key",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(&core.Affinity{
 | 
						|
					NodeAffinity: &core.NodeAffinity{
 | 
						|
						RequiredDuringSchedulingIgnoredDuringExecution: &core.NodeSelector{
 | 
						|
							NodeSelectorTerms: []core.NodeSelectorTerm{
 | 
						|
								{
 | 
						|
									MatchExpressions: []core.NodeSelectorRequirement{
 | 
						|
										{
 | 
						|
											Key:      "invalid key ___@#",
 | 
						|
											Operator: core.NodeSelectorOpExists,
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid node field selector requirement in node affinity, more values for field selector": {
 | 
						|
			expectedError: "spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms[0].matchFields[0].values",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(&core.Affinity{
 | 
						|
					NodeAffinity: &core.NodeAffinity{
 | 
						|
						RequiredDuringSchedulingIgnoredDuringExecution: &core.NodeSelector{
 | 
						|
							NodeSelectorTerms: []core.NodeSelectorTerm{
 | 
						|
								{
 | 
						|
									MatchFields: []core.NodeSelectorRequirement{
 | 
						|
										{
 | 
						|
											Key:      "metadata.name",
 | 
						|
											Operator: core.NodeSelectorOpIn,
 | 
						|
											Values:   []string{"host1", "host2"},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid node field selector requirement in node affinity, invalid operator": {
 | 
						|
			expectedError: "spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms[0].matchFields[0].operator",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(&core.Affinity{
 | 
						|
					NodeAffinity: &core.NodeAffinity{
 | 
						|
						RequiredDuringSchedulingIgnoredDuringExecution: &core.NodeSelector{
 | 
						|
							NodeSelectorTerms: []core.NodeSelectorTerm{
 | 
						|
								{
 | 
						|
									MatchFields: []core.NodeSelectorRequirement{
 | 
						|
										{
 | 
						|
											Key:      "metadata.name",
 | 
						|
											Operator: core.NodeSelectorOpExists,
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid node field selector requirement in node affinity, invalid key": {
 | 
						|
			expectedError: "spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms[0].matchFields[0].key",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(&core.Affinity{
 | 
						|
					NodeAffinity: &core.NodeAffinity{
 | 
						|
						RequiredDuringSchedulingIgnoredDuringExecution: &core.NodeSelector{
 | 
						|
							NodeSelectorTerms: []core.NodeSelectorTerm{
 | 
						|
								{
 | 
						|
									MatchFields: []core.NodeSelectorRequirement{
 | 
						|
										{
 | 
						|
											Key:      "metadata.namespace",
 | 
						|
											Operator: core.NodeSelectorOpIn,
 | 
						|
											Values:   []string{"ns1"},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid preferredSchedulingTerm in node affinity, weight should be in range 1-100": {
 | 
						|
			expectedError: "must be in the range 1-100",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(&core.Affinity{
 | 
						|
					NodeAffinity: &core.NodeAffinity{
 | 
						|
						PreferredDuringSchedulingIgnoredDuringExecution: []core.PreferredSchedulingTerm{
 | 
						|
							{
 | 
						|
								Weight: 199,
 | 
						|
								Preference: core.NodeSelectorTerm{
 | 
						|
									MatchExpressions: []core.NodeSelectorRequirement{
 | 
						|
										{
 | 
						|
											Key:      "foo",
 | 
						|
											Operator: core.NodeSelectorOpIn,
 | 
						|
											Values:   []string{"bar"},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid requiredDuringSchedulingIgnoredDuringExecution node selector, nodeSelectorTerms must have at least one term": {
 | 
						|
			expectedError: "spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(&core.Affinity{
 | 
						|
					NodeAffinity: &core.NodeAffinity{
 | 
						|
						RequiredDuringSchedulingIgnoredDuringExecution: &core.NodeSelector{
 | 
						|
							NodeSelectorTerms: []core.NodeSelectorTerm{},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid weight in preferredDuringSchedulingIgnoredDuringExecution in pod affinity annotations, weight should be in range 1-100": {
 | 
						|
			expectedError: "must be in the range 1-100",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(&core.Affinity{
 | 
						|
					PodAffinity: &core.PodAffinity{
 | 
						|
						PreferredDuringSchedulingIgnoredDuringExecution: []core.WeightedPodAffinityTerm{
 | 
						|
							{
 | 
						|
								Weight: 109,
 | 
						|
								PodAffinityTerm: core.PodAffinityTerm{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "key2",
 | 
						|
												Operator: metav1.LabelSelectorOpNotIn,
 | 
						|
												Values:   []string{"value1", "value2"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									Namespaces:  []string{"ns"},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid labelSelector in preferredDuringSchedulingIgnoredDuringExecution in podaffinity annotations, values should be empty if the operator is Exists": {
 | 
						|
			expectedError: "spec.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.matchExpressions.matchExpressions[0].values",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(&core.Affinity{
 | 
						|
					PodAntiAffinity: &core.PodAntiAffinity{
 | 
						|
						PreferredDuringSchedulingIgnoredDuringExecution: []core.WeightedPodAffinityTerm{
 | 
						|
							{
 | 
						|
								Weight: 10,
 | 
						|
								PodAffinityTerm: core.PodAffinityTerm{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "key2",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
												Values:   []string{"value1", "value2"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									Namespaces:  []string{"ns"},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid name space in preferredDuringSchedulingIgnoredDuringExecution in podaffinity annotations, name space shouldbe valid": {
 | 
						|
			expectedError: "spec.affinity.podAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.namespace",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(&core.Affinity{
 | 
						|
					PodAffinity: &core.PodAffinity{
 | 
						|
						PreferredDuringSchedulingIgnoredDuringExecution: []core.WeightedPodAffinityTerm{
 | 
						|
							{
 | 
						|
								Weight: 10,
 | 
						|
								PodAffinityTerm: core.PodAffinityTerm{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "key2",
 | 
						|
												Operator: metav1.LabelSelectorOpExists,
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									Namespaces:  []string{"INVALID_NAMESPACE"},
 | 
						|
									TopologyKey: "region",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid hard pod affinity, empty topologyKey is not allowed for hard pod affinity": {
 | 
						|
			expectedError: "can not be empty",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(&core.Affinity{
 | 
						|
					PodAffinity: &core.PodAffinity{
 | 
						|
						RequiredDuringSchedulingIgnoredDuringExecution: []core.PodAffinityTerm{
 | 
						|
							{
 | 
						|
								LabelSelector: &metav1.LabelSelector{
 | 
						|
									MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
										{
 | 
						|
											Key:      "key2",
 | 
						|
											Operator: metav1.LabelSelectorOpIn,
 | 
						|
											Values:   []string{"value1", "value2"},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
								Namespaces: []string{"ns"},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid hard pod anti-affinity, empty topologyKey is not allowed for hard pod anti-affinity": {
 | 
						|
			expectedError: "can not be empty",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(&core.Affinity{
 | 
						|
					PodAntiAffinity: &core.PodAntiAffinity{
 | 
						|
						RequiredDuringSchedulingIgnoredDuringExecution: []core.PodAffinityTerm{
 | 
						|
							{
 | 
						|
								LabelSelector: &metav1.LabelSelector{
 | 
						|
									MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
										{
 | 
						|
											Key:      "key2",
 | 
						|
											Operator: metav1.LabelSelectorOpIn,
 | 
						|
											Values:   []string{"value1", "value2"},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
								Namespaces: []string{"ns"},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid soft pod affinity, empty topologyKey is not allowed for soft pod affinity": {
 | 
						|
			expectedError: "can not be empty",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(&core.Affinity{
 | 
						|
					PodAffinity: &core.PodAffinity{
 | 
						|
						PreferredDuringSchedulingIgnoredDuringExecution: []core.WeightedPodAffinityTerm{
 | 
						|
							{
 | 
						|
								Weight: 10,
 | 
						|
								PodAffinityTerm: core.PodAffinityTerm{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "key2",
 | 
						|
												Operator: metav1.LabelSelectorOpNotIn,
 | 
						|
												Values:   []string{"value1", "value2"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									Namespaces: []string{"ns"},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid soft pod anti-affinity, empty topologyKey is not allowed for soft pod anti-affinity": {
 | 
						|
			expectedError: "can not be empty",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(&core.Affinity{
 | 
						|
					PodAntiAffinity: &core.PodAntiAffinity{
 | 
						|
						PreferredDuringSchedulingIgnoredDuringExecution: []core.WeightedPodAffinityTerm{
 | 
						|
							{
 | 
						|
								Weight: 10,
 | 
						|
								PodAffinityTerm: core.PodAffinityTerm{
 | 
						|
									LabelSelector: &metav1.LabelSelector{
 | 
						|
										MatchExpressions: []metav1.LabelSelectorRequirement{
 | 
						|
											{
 | 
						|
												Key:      "key2",
 | 
						|
												Operator: metav1.LabelSelectorOpNotIn,
 | 
						|
												Values:   []string{"value1", "value2"},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									Namespaces: []string{"ns"},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid toleration key": {
 | 
						|
			expectedError: "spec.tolerations[0].key",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
				},
 | 
						|
				Spec: extendPodSpecwithTolerations(validPodSpec(nil), []core.Toleration{{Key: "nospecialchars^=@", Operator: "Equal", Value: "bar", Effect: "NoSchedule"}}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid toleration operator": {
 | 
						|
			expectedError: "spec.tolerations[0].operator",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
				},
 | 
						|
				Spec: extendPodSpecwithTolerations(validPodSpec(nil), []core.Toleration{{Key: "foo", Operator: "In", Value: "bar", Effect: "NoSchedule"}}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"value must be empty when `operator` is 'Exists'": {
 | 
						|
			expectedError: "spec.tolerations[0].operator",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
				},
 | 
						|
				Spec: extendPodSpecwithTolerations(validPodSpec(nil), []core.Toleration{{Key: "foo", Operator: "Exists", Value: "bar", Effect: "NoSchedule"}}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
 | 
						|
		"operator must be 'Exists' when `key` is empty": {
 | 
						|
			expectedError: "spec.tolerations[0].operator",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
				},
 | 
						|
				Spec: extendPodSpecwithTolerations(validPodSpec(nil), []core.Toleration{{Operator: "Equal", Value: "bar", Effect: "NoSchedule"}}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"effect must be 'NoExecute' when `TolerationSeconds` is set": {
 | 
						|
			expectedError: "spec.tolerations[0].effect",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "pod-forgiveness-invalid",
 | 
						|
					Namespace: "ns",
 | 
						|
				},
 | 
						|
				Spec: extendPodSpecwithTolerations(validPodSpec(nil), []core.Toleration{{Key: "node.kubernetes.io/not-ready", Operator: "Exists", Effect: "NoSchedule", TolerationSeconds: &[]int64{20}[0]}}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"must be a valid pod seccomp profile": {
 | 
						|
			expectedError: "must be a valid seccomp profile",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
					Annotations: map[string]string{
 | 
						|
						core.SeccompPodAnnotationKey: "foo",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(nil),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"must be a valid container seccomp profile": {
 | 
						|
			expectedError: "must be a valid seccomp profile",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
					Annotations: map[string]string{
 | 
						|
						core.SeccompContainerAnnotationKeyPrefix + "foo": "foo",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(nil),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"must be a non-empty container name in seccomp annotation": {
 | 
						|
			expectedError: "name part must be non-empty",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
					Annotations: map[string]string{
 | 
						|
						core.SeccompContainerAnnotationKeyPrefix: "foo",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(nil),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"must be a non-empty container profile in seccomp annotation": {
 | 
						|
			expectedError: "must be a valid seccomp profile",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
					Annotations: map[string]string{
 | 
						|
						core.SeccompContainerAnnotationKeyPrefix + "foo": "",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(nil),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"must be a relative path in a node-local seccomp profile annotation": {
 | 
						|
			expectedError: "must be a relative path",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
					Annotations: map[string]string{
 | 
						|
						core.SeccompPodAnnotationKey: "localhost//foo",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(nil),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"must not start with '../'": {
 | 
						|
			expectedError: "must not contain '..'",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
					Annotations: map[string]string{
 | 
						|
						core.SeccompPodAnnotationKey: "localhost/../foo",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(nil),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"AppArmor profile must apply to a container": {
 | 
						|
			expectedError: "metadata.annotations[container.apparmor.security.beta.kubernetes.io/fake-ctr]",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
					Annotations: map[string]string{
 | 
						|
						apparmor.ContainerAnnotationKeyPrefix + "ctr":      apparmor.ProfileRuntimeDefault,
 | 
						|
						apparmor.ContainerAnnotationKeyPrefix + "init-ctr": apparmor.ProfileRuntimeDefault,
 | 
						|
						apparmor.ContainerAnnotationKeyPrefix + "fake-ctr": apparmor.ProfileRuntimeDefault,
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					InitContainers: []core.Container{{Name: "init-ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
					Containers:     []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
					RestartPolicy:  core.RestartPolicyAlways,
 | 
						|
					DNSPolicy:      core.DNSClusterFirst,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"AppArmor profile format must be valid": {
 | 
						|
			expectedError: "invalid AppArmor profile name",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
					Annotations: map[string]string{
 | 
						|
						apparmor.ContainerAnnotationKeyPrefix + "ctr": "bad-name",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(nil),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"only default AppArmor profile may start with runtime/": {
 | 
						|
			expectedError: "invalid AppArmor profile name",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
					Annotations: map[string]string{
 | 
						|
						apparmor.ContainerAnnotationKeyPrefix + "ctr": "runtime/foo",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(nil),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid sysctl annotation": {
 | 
						|
			expectedError: "metadata.annotations[security.alpha.kubernetes.io/sysctls]",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
					Annotations: map[string]string{
 | 
						|
						core.SysctlsPodAnnotationKey: "foo:",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(nil),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid comma-separated sysctl annotation": {
 | 
						|
			expectedError: "not of the format sysctl_name=value",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
					Annotations: map[string]string{
 | 
						|
						core.SysctlsPodAnnotationKey: "kernel.msgmax,",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(nil),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid unsafe sysctl annotation": {
 | 
						|
			expectedError: "metadata.annotations[security.alpha.kubernetes.io/sysctls]",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
					Annotations: map[string]string{
 | 
						|
						core.SysctlsPodAnnotationKey: "foo:",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(nil),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"intersecting safe sysctls and unsafe sysctls annotations": {
 | 
						|
			expectedError: "can not be safe and unsafe",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:      "123",
 | 
						|
					Namespace: "ns",
 | 
						|
					Annotations: map[string]string{
 | 
						|
						core.SysctlsPodAnnotationKey:       "kernel.shmmax=10000000",
 | 
						|
						core.UnsafeSysctlsPodAnnotationKey: "kernel.shmmax=10000000",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: validPodSpec(nil),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid extended resource requirement: request must be == limit": {
 | 
						|
			expectedError: "must be equal to example.com/a",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "123", Namespace: "ns"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					Containers: []core.Container{
 | 
						|
						{
 | 
						|
							Name:            "invalid",
 | 
						|
							Image:           "image",
 | 
						|
							ImagePullPolicy: "IfNotPresent",
 | 
						|
							Resources: core.ResourceRequirements{
 | 
						|
								Requests: core.ResourceList{
 | 
						|
									core.ResourceName("example.com/a"): resource.MustParse("2"),
 | 
						|
								},
 | 
						|
								Limits: core.ResourceList{
 | 
						|
									core.ResourceName("example.com/a"): resource.MustParse("1"),
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
					RestartPolicy: core.RestartPolicyAlways,
 | 
						|
					DNSPolicy:     core.DNSClusterFirst,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid extended resource requirement without limit": {
 | 
						|
			expectedError: "Limit must be set",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "123", Namespace: "ns"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					Containers: []core.Container{
 | 
						|
						{
 | 
						|
							Name:            "invalid",
 | 
						|
							Image:           "image",
 | 
						|
							ImagePullPolicy: "IfNotPresent",
 | 
						|
							Resources: core.ResourceRequirements{
 | 
						|
								Requests: core.ResourceList{
 | 
						|
									core.ResourceName("example.com/a"): resource.MustParse("2"),
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
					RestartPolicy: core.RestartPolicyAlways,
 | 
						|
					DNSPolicy:     core.DNSClusterFirst,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid fractional extended resource in container request": {
 | 
						|
			expectedError: "must be an integer",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "123", Namespace: "ns"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					Containers: []core.Container{
 | 
						|
						{
 | 
						|
							Name:            "invalid",
 | 
						|
							Image:           "image",
 | 
						|
							ImagePullPolicy: "IfNotPresent",
 | 
						|
							Resources: core.ResourceRequirements{
 | 
						|
								Requests: core.ResourceList{
 | 
						|
									core.ResourceName("example.com/a"): resource.MustParse("500m"),
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
					RestartPolicy: core.RestartPolicyAlways,
 | 
						|
					DNSPolicy:     core.DNSClusterFirst,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid fractional extended resource in init container request": {
 | 
						|
			expectedError: "must be an integer",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "123", Namespace: "ns"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					InitContainers: []core.Container{
 | 
						|
						{
 | 
						|
							Name:            "invalid",
 | 
						|
							Image:           "image",
 | 
						|
							ImagePullPolicy: "IfNotPresent",
 | 
						|
							Resources: core.ResourceRequirements{
 | 
						|
								Requests: core.ResourceList{
 | 
						|
									core.ResourceName("example.com/a"): resource.MustParse("500m"),
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
					Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
					RestartPolicy: core.RestartPolicyAlways,
 | 
						|
					DNSPolicy:     core.DNSClusterFirst,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid fractional extended resource in container limit": {
 | 
						|
			expectedError: "must be an integer",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "123", Namespace: "ns"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					Containers: []core.Container{
 | 
						|
						{
 | 
						|
							Name:            "invalid",
 | 
						|
							Image:           "image",
 | 
						|
							ImagePullPolicy: "IfNotPresent",
 | 
						|
							Resources: core.ResourceRequirements{
 | 
						|
								Requests: core.ResourceList{
 | 
						|
									core.ResourceName("example.com/a"): resource.MustParse("5"),
 | 
						|
								},
 | 
						|
								Limits: core.ResourceList{
 | 
						|
									core.ResourceName("example.com/a"): resource.MustParse("2.5"),
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
					RestartPolicy: core.RestartPolicyAlways,
 | 
						|
					DNSPolicy:     core.DNSClusterFirst,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid fractional extended resource in init container limit": {
 | 
						|
			expectedError: "must be an integer",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "123", Namespace: "ns"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					InitContainers: []core.Container{
 | 
						|
						{
 | 
						|
							Name:            "invalid",
 | 
						|
							Image:           "image",
 | 
						|
							ImagePullPolicy: "IfNotPresent",
 | 
						|
							Resources: core.ResourceRequirements{
 | 
						|
								Requests: core.ResourceList{
 | 
						|
									core.ResourceName("example.com/a"): resource.MustParse("2.5"),
 | 
						|
								},
 | 
						|
								Limits: core.ResourceList{
 | 
						|
									core.ResourceName("example.com/a"): resource.MustParse("2.5"),
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
					Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
					RestartPolicy: core.RestartPolicyAlways,
 | 
						|
					DNSPolicy:     core.DNSClusterFirst,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"mirror-pod present without nodeName": {
 | 
						|
			expectedError: "mirror",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "123", Namespace: "ns", Annotations: map[string]string{core.MirrorPodAnnotationKey: ""}},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
					RestartPolicy: core.RestartPolicyAlways,
 | 
						|
					DNSPolicy:     core.DNSClusterFirst,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"mirror-pod populated without nodeName": {
 | 
						|
			expectedError: "mirror",
 | 
						|
			spec: core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "123", Namespace: "ns", Annotations: map[string]string{core.MirrorPodAnnotationKey: "foo"}},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
					RestartPolicy: core.RestartPolicyAlways,
 | 
						|
					DNSPolicy:     core.DNSClusterFirst,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for k, v := range errorCases {
 | 
						|
		if errs := ValidatePod(&v.spec); len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure for %q", k)
 | 
						|
		} else if v.expectedError == "" {
 | 
						|
			t.Errorf("missing expectedError for %q, got %q", k, errs.ToAggregate().Error())
 | 
						|
		} else if actualError := errs.ToAggregate().Error(); !strings.Contains(actualError, v.expectedError) {
 | 
						|
			t.Errorf("expected error for %q to contain %q, got %q", k, v.expectedError, actualError)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidatePodUpdate(t *testing.T) {
 | 
						|
	var (
 | 
						|
		activeDeadlineSecondsZero     = int64(0)
 | 
						|
		activeDeadlineSecondsNegative = int64(-30)
 | 
						|
		activeDeadlineSecondsPositive = int64(30)
 | 
						|
		activeDeadlineSecondsLarger   = int64(31)
 | 
						|
 | 
						|
		now    = metav1.Now()
 | 
						|
		grace  = int64(30)
 | 
						|
		grace2 = int64(31)
 | 
						|
	)
 | 
						|
 | 
						|
	tests := []struct {
 | 
						|
		new  core.Pod
 | 
						|
		old  core.Pod
 | 
						|
		err  string
 | 
						|
		test string
 | 
						|
	}{
 | 
						|
		{core.Pod{}, core.Pod{}, "", "nothing"},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo"},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "bar"},
 | 
						|
			},
 | 
						|
			"metadata.name",
 | 
						|
			"ids",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
					Labels: map[string]string{
 | 
						|
						"foo": "bar",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
					Labels: map[string]string{
 | 
						|
						"bar": "foo",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"",
 | 
						|
			"labels",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
					Annotations: map[string]string{
 | 
						|
						"foo": "bar",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
					Annotations: map[string]string{
 | 
						|
						"bar": "foo",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"",
 | 
						|
			"annotations",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					Containers: []core.Container{
 | 
						|
						{
 | 
						|
							Image: "foo:V1",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					Containers: []core.Container{
 | 
						|
						{
 | 
						|
							Image: "foo:V2",
 | 
						|
						},
 | 
						|
						{
 | 
						|
							Image: "bar:V2",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"may not add or remove containers",
 | 
						|
			"less containers",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					Containers: []core.Container{
 | 
						|
						{
 | 
						|
							Image: "foo:V1",
 | 
						|
						},
 | 
						|
						{
 | 
						|
							Image: "bar:V2",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					Containers: []core.Container{
 | 
						|
						{
 | 
						|
							Image: "foo:V2",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"may not add or remove containers",
 | 
						|
			"more containers",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					InitContainers: []core.Container{
 | 
						|
						{
 | 
						|
							Image: "foo:V1",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					InitContainers: []core.Container{
 | 
						|
						{
 | 
						|
							Image: "foo:V2",
 | 
						|
						},
 | 
						|
						{
 | 
						|
							Image: "bar:V2",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"may not add or remove containers",
 | 
						|
			"more init containers",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo"},
 | 
						|
				Spec:       core.PodSpec{Containers: []core.Container{{Image: "foo:V1"}}},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo", DeletionTimestamp: &now},
 | 
						|
				Spec:       core.PodSpec{Containers: []core.Container{{Image: "foo:V1"}}},
 | 
						|
			},
 | 
						|
			"",
 | 
						|
			"deletion timestamp removed",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo", DeletionTimestamp: &now},
 | 
						|
				Spec:       core.PodSpec{Containers: []core.Container{{Image: "foo:V1"}}},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo"},
 | 
						|
				Spec:       core.PodSpec{Containers: []core.Container{{Image: "foo:V1"}}},
 | 
						|
			},
 | 
						|
			"metadata.deletionTimestamp",
 | 
						|
			"deletion timestamp added",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo", DeletionTimestamp: &now, DeletionGracePeriodSeconds: &grace},
 | 
						|
				Spec:       core.PodSpec{Containers: []core.Container{{Image: "foo:V1"}}},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo", DeletionTimestamp: &now, DeletionGracePeriodSeconds: &grace2},
 | 
						|
				Spec:       core.PodSpec{Containers: []core.Container{{Image: "foo:V1"}}},
 | 
						|
			},
 | 
						|
			"metadata.deletionGracePeriodSeconds",
 | 
						|
			"deletion grace period seconds changed",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					Containers: []core.Container{
 | 
						|
						{
 | 
						|
							Image: "foo:V1",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					Containers: []core.Container{
 | 
						|
						{
 | 
						|
							Image: "foo:V2",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"",
 | 
						|
			"image change",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					InitContainers: []core.Container{
 | 
						|
						{
 | 
						|
							Image: "foo:V1",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					InitContainers: []core.Container{
 | 
						|
						{
 | 
						|
							Image: "foo:V2",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"",
 | 
						|
			"init container image change",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					Containers: []core.Container{
 | 
						|
						{},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					Containers: []core.Container{
 | 
						|
						{
 | 
						|
							Image: "foo:V2",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"spec.containers[0].image",
 | 
						|
			"image change to empty",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					InitContainers: []core.Container{
 | 
						|
						{},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					InitContainers: []core.Container{
 | 
						|
						{
 | 
						|
							Image: "foo:V2",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"spec.initContainers[0].image",
 | 
						|
			"init container image change to empty",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				Spec: core.PodSpec{},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				Spec: core.PodSpec{},
 | 
						|
			},
 | 
						|
			"",
 | 
						|
			"activeDeadlineSeconds no change, nil",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					ActiveDeadlineSeconds: &activeDeadlineSecondsPositive,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					ActiveDeadlineSeconds: &activeDeadlineSecondsPositive,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"",
 | 
						|
			"activeDeadlineSeconds no change, set",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					ActiveDeadlineSeconds: &activeDeadlineSecondsPositive,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{},
 | 
						|
			"",
 | 
						|
			"activeDeadlineSeconds change to positive from nil",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					ActiveDeadlineSeconds: &activeDeadlineSecondsPositive,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					ActiveDeadlineSeconds: &activeDeadlineSecondsLarger,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"",
 | 
						|
			"activeDeadlineSeconds change to smaller positive",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					ActiveDeadlineSeconds: &activeDeadlineSecondsLarger,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					ActiveDeadlineSeconds: &activeDeadlineSecondsPositive,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"spec.activeDeadlineSeconds",
 | 
						|
			"activeDeadlineSeconds change to larger positive",
 | 
						|
		},
 | 
						|
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					ActiveDeadlineSeconds: &activeDeadlineSecondsNegative,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{},
 | 
						|
			"spec.activeDeadlineSeconds",
 | 
						|
			"activeDeadlineSeconds change to negative from nil",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					ActiveDeadlineSeconds: &activeDeadlineSecondsNegative,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					ActiveDeadlineSeconds: &activeDeadlineSecondsPositive,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"spec.activeDeadlineSeconds",
 | 
						|
			"activeDeadlineSeconds change to negative from positive",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					ActiveDeadlineSeconds: &activeDeadlineSecondsZero,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					ActiveDeadlineSeconds: &activeDeadlineSecondsPositive,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"",
 | 
						|
			"activeDeadlineSeconds change to zero from positive",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					ActiveDeadlineSeconds: &activeDeadlineSecondsZero,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{},
 | 
						|
			"",
 | 
						|
			"activeDeadlineSeconds change to zero from nil",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{},
 | 
						|
			core.Pod{
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					ActiveDeadlineSeconds: &activeDeadlineSecondsPositive,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"spec.activeDeadlineSeconds",
 | 
						|
			"activeDeadlineSeconds change to nil from positive",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					Containers: []core.Container{
 | 
						|
						{
 | 
						|
							Image: "foo:V1",
 | 
						|
							Resources: core.ResourceRequirements{
 | 
						|
								Limits: getResourceLimits("100m", "0"),
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					Containers: []core.Container{
 | 
						|
						{
 | 
						|
							Image: "foo:V2",
 | 
						|
							Resources: core.ResourceRequirements{
 | 
						|
								Limits: getResourceLimits("1000m", "0"),
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"spec: Forbidden: pod updates may not change fields",
 | 
						|
			"cpu change",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					Containers: []core.Container{
 | 
						|
						{
 | 
						|
							Image: "foo:V1",
 | 
						|
							Ports: []core.ContainerPort{
 | 
						|
								{HostPort: 8080, ContainerPort: 80},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo"},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					Containers: []core.Container{
 | 
						|
						{
 | 
						|
							Image: "foo:V2",
 | 
						|
							Ports: []core.ContainerPort{
 | 
						|
								{HostPort: 8000, ContainerPort: 80},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"spec: Forbidden: pod updates may not change fields",
 | 
						|
			"port change",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
					Labels: map[string]string{
 | 
						|
						"foo": "bar",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
					Labels: map[string]string{
 | 
						|
						"Bar": "foo",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"",
 | 
						|
			"bad label change",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName:    "node1",
 | 
						|
					Tolerations: []core.Toleration{{Key: "key1", Value: "value2"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName:    "node1",
 | 
						|
					Tolerations: []core.Toleration{{Key: "key1", Value: "value1"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"spec.tolerations: Forbidden",
 | 
						|
			"existing toleration value modified in pod spec updates",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName:    "node1",
 | 
						|
					Tolerations: []core.Toleration{{Key: "key1", Value: "value2", Operator: "Equal", Effect: "NoExecute", TolerationSeconds: nil}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName:    "node1",
 | 
						|
					Tolerations: []core.Toleration{{Key: "key1", Value: "value1", Operator: "Equal", Effect: "NoExecute", TolerationSeconds: &[]int64{10}[0]}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"spec.tolerations: Forbidden",
 | 
						|
			"existing toleration value modified in pod spec updates with modified tolerationSeconds",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName:    "node1",
 | 
						|
					Tolerations: []core.Toleration{{Key: "key1", Value: "value1", Operator: "Equal", Effect: "NoExecute", TolerationSeconds: &[]int64{10}[0]}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName:    "node1",
 | 
						|
					Tolerations: []core.Toleration{{Key: "key1", Value: "value1", Operator: "Equal", Effect: "NoExecute", TolerationSeconds: &[]int64{20}[0]}},
 | 
						|
				}},
 | 
						|
			"",
 | 
						|
			"modified tolerationSeconds in existing toleration value in pod spec updates",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					Tolerations: []core.Toleration{{Key: "key1", Value: "value2"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName:    "",
 | 
						|
					Tolerations: []core.Toleration{{Key: "key1", Value: "value1"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"spec.tolerations: Forbidden",
 | 
						|
			"toleration modified in updates to an unscheduled pod",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName:    "node1",
 | 
						|
					Tolerations: []core.Toleration{{Key: "key1", Value: "value1"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName:    "node1",
 | 
						|
					Tolerations: []core.Toleration{{Key: "key1", Value: "value1"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"",
 | 
						|
			"tolerations unmodified in updates to a scheduled pod",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName: "node1",
 | 
						|
					Tolerations: []core.Toleration{
 | 
						|
						{Key: "key1", Value: "value1", Operator: "Equal", Effect: "NoExecute", TolerationSeconds: &[]int64{20}[0]},
 | 
						|
						{Key: "key2", Value: "value2", Operator: "Equal", Effect: "NoExecute", TolerationSeconds: &[]int64{30}[0]},
 | 
						|
					},
 | 
						|
				}},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName:    "node1",
 | 
						|
					Tolerations: []core.Toleration{{Key: "key1", Value: "value1", Operator: "Equal", Effect: "NoExecute", TolerationSeconds: &[]int64{10}[0]}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"",
 | 
						|
			"added valid new toleration to existing tolerations in pod spec updates",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "foo"}, Spec: core.PodSpec{
 | 
						|
					NodeName: "node1",
 | 
						|
					Tolerations: []core.Toleration{
 | 
						|
						{Key: "key1", Value: "value1", Operator: "Equal", Effect: "NoExecute", TolerationSeconds: &[]int64{20}[0]},
 | 
						|
						{Key: "key2", Value: "value2", Operator: "Equal", Effect: "NoSchedule", TolerationSeconds: &[]int64{30}[0]},
 | 
						|
					},
 | 
						|
				}},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName: "node1", Tolerations: []core.Toleration{{Key: "key1", Value: "value1", Operator: "Equal", Effect: "NoExecute", TolerationSeconds: &[]int64{10}[0]}},
 | 
						|
				}},
 | 
						|
			"spec.tolerations[1].effect",
 | 
						|
			"added invalid new toleration to existing tolerations in pod spec updates",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{ObjectMeta: metav1.ObjectMeta{Name: "foo"}, Spec: core.PodSpec{NodeName: "foo"}},
 | 
						|
			core.Pod{ObjectMeta: metav1.ObjectMeta{Name: "foo"}},
 | 
						|
			"spec: Forbidden: pod updates may not change fields",
 | 
						|
			"removed nodeName from pod spec",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{ObjectMeta: metav1.ObjectMeta{Name: "foo", Annotations: map[string]string{core.MirrorPodAnnotationKey: ""}}, Spec: core.PodSpec{NodeName: "foo"}},
 | 
						|
			core.Pod{ObjectMeta: metav1.ObjectMeta{Name: "foo"}, Spec: core.PodSpec{NodeName: "foo"}},
 | 
						|
			"metadata.annotations[kubernetes.io/config.mirror]",
 | 
						|
			"added mirror pod annotation",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{ObjectMeta: metav1.ObjectMeta{Name: "foo"}, Spec: core.PodSpec{NodeName: "foo"}},
 | 
						|
			core.Pod{ObjectMeta: metav1.ObjectMeta{Name: "foo", Annotations: map[string]string{core.MirrorPodAnnotationKey: ""}}, Spec: core.PodSpec{NodeName: "foo"}},
 | 
						|
			"metadata.annotations[kubernetes.io/config.mirror]",
 | 
						|
			"removed mirror pod annotation",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{ObjectMeta: metav1.ObjectMeta{Name: "foo", Annotations: map[string]string{core.MirrorPodAnnotationKey: "foo"}}, Spec: core.PodSpec{NodeName: "foo"}},
 | 
						|
			core.Pod{ObjectMeta: metav1.ObjectMeta{Name: "foo", Annotations: map[string]string{core.MirrorPodAnnotationKey: "bar"}}, Spec: core.PodSpec{NodeName: "foo"}},
 | 
						|
			"metadata.annotations[kubernetes.io/config.mirror]",
 | 
						|
			"changed mirror pod annotation",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName:          "node1",
 | 
						|
					PriorityClassName: "bar-priority",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName:          "node1",
 | 
						|
					PriorityClassName: "foo-priority",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"spec: Forbidden: pod updates",
 | 
						|
			"changed priority class name",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName:          "node1",
 | 
						|
					PriorityClassName: "",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName:          "node1",
 | 
						|
					PriorityClassName: "foo-priority",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"spec: Forbidden: pod updates",
 | 
						|
			"removed priority class name",
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		test.new.ObjectMeta.ResourceVersion = "1"
 | 
						|
		test.old.ObjectMeta.ResourceVersion = "1"
 | 
						|
		errs := ValidatePodUpdate(&test.new, &test.old)
 | 
						|
		if test.err == "" {
 | 
						|
			if len(errs) != 0 {
 | 
						|
				t.Errorf("unexpected invalid: %s (%+v)\nA: %+v\nB: %+v", test.test, errs, test.new, test.old)
 | 
						|
			}
 | 
						|
		} else {
 | 
						|
			if len(errs) == 0 {
 | 
						|
				t.Errorf("unexpected valid: %s\nA: %+v\nB: %+v", test.test, test.new, test.old)
 | 
						|
			} else if actualErr := errs.ToAggregate().Error(); !strings.Contains(actualErr, test.err) {
 | 
						|
				t.Errorf("unexpected error message: %s\nExpected error: %s\nActual error: %s", test.test, test.err, actualErr)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidatePodStatusUpdate(t *testing.T) {
 | 
						|
	tests := []struct {
 | 
						|
		new  core.Pod
 | 
						|
		old  core.Pod
 | 
						|
		err  string
 | 
						|
		test string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName: "node1",
 | 
						|
				},
 | 
						|
				Status: core.PodStatus{
 | 
						|
					NominatedNodeName: "node1",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName: "node1",
 | 
						|
				},
 | 
						|
				Status: core.PodStatus{},
 | 
						|
			},
 | 
						|
			"",
 | 
						|
			"removed nominatedNodeName",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName: "node1",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName: "node1",
 | 
						|
				},
 | 
						|
				Status: core.PodStatus{
 | 
						|
					NominatedNodeName: "node1",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"",
 | 
						|
			"add valid nominatedNodeName",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName: "node1",
 | 
						|
				},
 | 
						|
				Status: core.PodStatus{
 | 
						|
					NominatedNodeName: "Node1",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName: "node1",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"nominatedNodeName",
 | 
						|
			"Add invalid nominatedNodeName",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName: "node1",
 | 
						|
				},
 | 
						|
				Status: core.PodStatus{
 | 
						|
					NominatedNodeName: "node1",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			core.Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo",
 | 
						|
				},
 | 
						|
				Spec: core.PodSpec{
 | 
						|
					NodeName: "node1",
 | 
						|
				},
 | 
						|
				Status: core.PodStatus{
 | 
						|
					NominatedNodeName: "node2",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			"",
 | 
						|
			"Update nominatedNodeName",
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		test.new.ObjectMeta.ResourceVersion = "1"
 | 
						|
		test.old.ObjectMeta.ResourceVersion = "1"
 | 
						|
		errs := ValidatePodStatusUpdate(&test.new, &test.old)
 | 
						|
		if test.err == "" {
 | 
						|
			if len(errs) != 0 {
 | 
						|
				t.Errorf("unexpected invalid: %s (%+v)\nA: %+v\nB: %+v", test.test, errs, test.new, test.old)
 | 
						|
			}
 | 
						|
		} else {
 | 
						|
			if len(errs) == 0 {
 | 
						|
				t.Errorf("unexpected valid: %s\nA: %+v\nB: %+v", test.test, test.new, test.old)
 | 
						|
			} else if actualErr := errs.ToAggregate().Error(); !strings.Contains(actualErr, test.err) {
 | 
						|
				t.Errorf("unexpected error message: %s\nExpected error: %s\nActual error: %s", test.test, test.err, actualErr)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func makeValidService() core.Service {
 | 
						|
	return core.Service{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name:            "valid",
 | 
						|
			Namespace:       "valid",
 | 
						|
			Labels:          map[string]string{},
 | 
						|
			Annotations:     map[string]string{},
 | 
						|
			ResourceVersion: "1",
 | 
						|
		},
 | 
						|
		Spec: core.ServiceSpec{
 | 
						|
			Selector:        map[string]string{"key": "val"},
 | 
						|
			SessionAffinity: "None",
 | 
						|
			Type:            core.ServiceTypeClusterIP,
 | 
						|
			Ports:           []core.ServicePort{{Name: "p", Protocol: "TCP", Port: 8675, TargetPort: intstr.FromInt(8675)}},
 | 
						|
		},
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateService(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		name     string
 | 
						|
		tweakSvc func(svc *core.Service) // given a basic valid service, each test case can customize it
 | 
						|
		numErrs  int
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name: "missing namespace",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Namespace = ""
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid namespace",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Namespace = "-123"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "missing name",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Name = ""
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid name",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Name = "-123"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "too long name",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Name = strings.Repeat("a", 64)
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid generateName",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.GenerateName = "-123"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "too long generateName",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.GenerateName = strings.Repeat("a", 64)
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid label",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Labels["NoUppercaseOrSpecialCharsLike=Equals"] = "bar"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid annotation",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Annotations["NoSpecialCharsLike=Equals"] = "bar"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "nil selector",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Selector = nil
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid selector",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Selector["NoSpecialCharsLike=Equals"] = "bar"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "missing session affinity",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.SessionAffinity = ""
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "missing type",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = ""
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "missing ports",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Ports = nil
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "missing ports but headless",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Ports = nil
 | 
						|
				s.Spec.ClusterIP = core.ClusterIPNone
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "empty port[0] name",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Ports[0].Name = ""
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "empty port[1] name",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "", Protocol: "TCP", Port: 12345, TargetPort: intstr.FromInt(12345)})
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "empty multi-port port[0] name",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Ports[0].Name = ""
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "p", Protocol: "TCP", Port: 12345, TargetPort: intstr.FromInt(12345)})
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid port name",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Ports[0].Name = "INVALID"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "missing protocol",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Ports[0].Protocol = ""
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid protocol",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Ports[0].Protocol = "INVALID"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid cluster ip",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.ClusterIP = "invalid"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "missing port",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Ports[0].Port = 0
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid port",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Ports[0].Port = 65536
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid TargetPort int",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Ports[0].TargetPort = intstr.FromInt(65536)
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid port headless",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Ports[0].Port = 11722
 | 
						|
				s.Spec.Ports[0].TargetPort = intstr.FromInt(11722)
 | 
						|
				s.Spec.ClusterIP = core.ClusterIPNone
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid port headless 1",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Ports[0].Port = 11722
 | 
						|
				s.Spec.Ports[0].TargetPort = intstr.FromInt(11721)
 | 
						|
				s.Spec.ClusterIP = core.ClusterIPNone
 | 
						|
			},
 | 
						|
			// in the v1 API, targetPorts on headless services were tolerated.
 | 
						|
			// once we have version-specific validation, we can reject this on newer API versions, but until then, we have to tolerate it for compatibility.
 | 
						|
			// numErrs: 1,
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid port headless 2",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Ports[0].Port = 11722
 | 
						|
				s.Spec.Ports[0].TargetPort = intstr.FromString("target")
 | 
						|
				s.Spec.ClusterIP = core.ClusterIPNone
 | 
						|
			},
 | 
						|
			// in the v1 API, targetPorts on headless services were tolerated.
 | 
						|
			// once we have version-specific validation, we can reject this on newer API versions, but until then, we have to tolerate it for compatibility.
 | 
						|
			// numErrs: 1,
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid publicIPs localhost",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.ExternalIPs = []string{"127.0.0.1"}
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid publicIPs unspecified",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.ExternalIPs = []string{"0.0.0.0"}
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid publicIPs loopback",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.ExternalIPs = []string{"127.0.0.1"}
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid publicIPs host",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.ExternalIPs = []string{"myhost.mydomain"}
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "dup port name",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Ports[0].Name = "p"
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "p", Port: 12345, Protocol: "TCP", TargetPort: intstr.FromInt(12345)})
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid load balancer protocol UDP 1",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				s.Spec.Ports[0].Protocol = "UDP"
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid load balancer protocol UDP 2",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				s.Spec.Ports[0] = core.ServicePort{Name: "q", Port: 12345, Protocol: "UDP", TargetPort: intstr.FromInt(12345)}
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid load balancer with mix protocol",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "q", Port: 12345, Protocol: "UDP", TargetPort: intstr.FromInt(12345)})
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid 1",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				// do nothing
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid 2",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Ports[0].Protocol = "UDP"
 | 
						|
				s.Spec.Ports[0].TargetPort = intstr.FromInt(12345)
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid 3",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Ports[0].TargetPort = intstr.FromString("http")
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid cluster ip - none ",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.ClusterIP = "None"
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid cluster ip - empty",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.ClusterIP = ""
 | 
						|
				s.Spec.Ports[0].TargetPort = intstr.FromString("http")
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid type - cluster",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid type - loadbalancer",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid type loadbalancer 2 ports",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "q", Port: 12345, Protocol: "TCP", TargetPort: intstr.FromInt(12345)})
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid external load balancer 2 ports",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "q", Port: 12345, Protocol: "TCP", TargetPort: intstr.FromInt(12345)})
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "duplicate nodeports",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeNodePort
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "q", Port: 1, Protocol: "TCP", NodePort: 1, TargetPort: intstr.FromInt(1)})
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "r", Port: 2, Protocol: "TCP", NodePort: 1, TargetPort: intstr.FromInt(2)})
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "duplicate nodeports (different protocols)",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeNodePort
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "q", Port: 1, Protocol: "TCP", NodePort: 1, TargetPort: intstr.FromInt(1)})
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "r", Port: 2, Protocol: "UDP", NodePort: 1, TargetPort: intstr.FromInt(2)})
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid duplicate ports (with same protocol)",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "q", Port: 12345, Protocol: "TCP", TargetPort: intstr.FromInt(8080)})
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "r", Port: 12345, Protocol: "TCP", TargetPort: intstr.FromInt(80)})
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid duplicate ports (with different protocols)",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "q", Port: 12345, Protocol: "TCP", TargetPort: intstr.FromInt(8080)})
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "r", Port: 12345, Protocol: "UDP", TargetPort: intstr.FromInt(80)})
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid type - cluster",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid type - nodeport",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeNodePort
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid type - loadbalancer",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid type loadbalancer 2 ports",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "q", Port: 12345, Protocol: "TCP", TargetPort: intstr.FromInt(12345)})
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid type loadbalancer with NodePort",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "q", Port: 12345, Protocol: "TCP", NodePort: 12345, TargetPort: intstr.FromInt(12345)})
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid type=NodePort service with NodePort",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeNodePort
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "q", Port: 12345, Protocol: "TCP", NodePort: 12345, TargetPort: intstr.FromInt(12345)})
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid type=NodePort service without NodePort",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeNodePort
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "q", Port: 12345, Protocol: "TCP", TargetPort: intstr.FromInt(12345)})
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid cluster service without NodePort",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "q", Port: 12345, Protocol: "TCP", TargetPort: intstr.FromInt(12345)})
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid cluster service with NodePort",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "q", Port: 12345, Protocol: "TCP", NodePort: 12345, TargetPort: intstr.FromInt(12345)})
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid public service with duplicate NodePort",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeNodePort
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "p1", Port: 1, Protocol: "TCP", NodePort: 1, TargetPort: intstr.FromInt(1)})
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "p2", Port: 2, Protocol: "TCP", NodePort: 1, TargetPort: intstr.FromInt(2)})
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid type=LoadBalancer",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "q", Port: 12345, Protocol: "TCP", TargetPort: intstr.FromInt(12345)})
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			// For now we open firewalls, and its insecure if we open 10250, remove this
 | 
						|
			// when we have better protections in place.
 | 
						|
			name: "invalid port type=LoadBalancer",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "kubelet", Port: 10250, Protocol: "TCP", TargetPort: intstr.FromInt(12345)})
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid LoadBalancer source range annotation",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				s.Annotations[core.AnnotationLoadBalancerSourceRangesKey] = "1.2.3.4/8,  5.6.7.8/16"
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "empty LoadBalancer source range annotation",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				s.Annotations[core.AnnotationLoadBalancerSourceRangesKey] = ""
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid LoadBalancer source range annotation (hostname)",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Annotations[core.AnnotationLoadBalancerSourceRangesKey] = "foo.bar"
 | 
						|
			},
 | 
						|
			numErrs: 2,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid LoadBalancer source range annotation (invalid CIDR)",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				s.Annotations[core.AnnotationLoadBalancerSourceRangesKey] = "1.2.3.4/33"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid source range for non LoadBalancer type service",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.LoadBalancerSourceRanges = []string{"1.2.3.4/8", "5.6.7.8/16"}
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid LoadBalancer source range",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				s.Spec.LoadBalancerSourceRanges = []string{"1.2.3.4/8", "5.6.7.8/16"}
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "empty LoadBalancer source range",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				s.Spec.LoadBalancerSourceRanges = []string{"   "}
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid LoadBalancer source range",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				s.Spec.LoadBalancerSourceRanges = []string{"foo.bar"}
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid ExternalName",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeExternalName
 | 
						|
				s.Spec.ClusterIP = ""
 | 
						|
				s.Spec.ExternalName = "foo.bar.example.com"
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid ExternalName clusterIP (valid IP)",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeExternalName
 | 
						|
				s.Spec.ClusterIP = "1.2.3.4"
 | 
						|
				s.Spec.ExternalName = "foo.bar.example.com"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid ExternalName clusterIP (None)",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeExternalName
 | 
						|
				s.Spec.ClusterIP = "None"
 | 
						|
				s.Spec.ExternalName = "foo.bar.example.com"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid ExternalName (not a DNS name)",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeExternalName
 | 
						|
				s.Spec.ClusterIP = ""
 | 
						|
				s.Spec.ExternalName = "-123"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "LoadBalancer type cannot have None ClusterIP",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.ClusterIP = "None"
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid node port with clusterIP None",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeNodePort
 | 
						|
				s.Spec.Ports = append(s.Spec.Ports, core.ServicePort{Name: "q", Port: 1, Protocol: "TCP", NodePort: 1, TargetPort: intstr.FromInt(1)})
 | 
						|
				s.Spec.ClusterIP = "None"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		// ESIPP section begins.
 | 
						|
		{
 | 
						|
			name: "invalid externalTraffic field",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				s.Spec.ExternalTrafficPolicy = "invalid"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "nagative healthCheckNodePort field",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				s.Spec.ExternalTrafficPolicy = core.ServiceExternalTrafficPolicyTypeLocal
 | 
						|
				s.Spec.HealthCheckNodePort = -1
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "nagative healthCheckNodePort field",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				s.Spec.ExternalTrafficPolicy = core.ServiceExternalTrafficPolicyTypeLocal
 | 
						|
				s.Spec.HealthCheckNodePort = 31100
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		// ESIPP section ends.
 | 
						|
		{
 | 
						|
			name: "invalid timeoutSeconds field",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
				s.Spec.SessionAffinity = core.ServiceAffinityClientIP
 | 
						|
				s.Spec.SessionAffinityConfig = &core.SessionAffinityConfig{
 | 
						|
					ClientIP: &core.ClientIPConfig{
 | 
						|
						TimeoutSeconds: utilpointer.Int32Ptr(-1),
 | 
						|
					},
 | 
						|
				}
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "sessionAffinityConfig can't be set when session affinity is None",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				s.Spec.SessionAffinity = core.ServiceAffinityNone
 | 
						|
				s.Spec.SessionAffinityConfig = &core.SessionAffinityConfig{
 | 
						|
					ClientIP: &core.ClientIPConfig{
 | 
						|
						TimeoutSeconds: utilpointer.Int32Ptr(90),
 | 
						|
					},
 | 
						|
				}
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, tc := range testCases {
 | 
						|
		svc := makeValidService()
 | 
						|
		tc.tweakSvc(&svc)
 | 
						|
		errs := ValidateService(&svc)
 | 
						|
		if len(errs) != tc.numErrs {
 | 
						|
			t.Errorf("Unexpected error list for case %q: %v", tc.name, errs.ToAggregate())
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateServiceExternalTrafficFieldsCombination(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		name     string
 | 
						|
		tweakSvc func(svc *core.Service) // Given a basic valid service, each test case can customize it.
 | 
						|
		numErrs  int
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name: "valid loadBalancer service with externalTrafficPolicy and healthCheckNodePort set",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				s.Spec.ExternalTrafficPolicy = core.ServiceExternalTrafficPolicyTypeLocal
 | 
						|
				s.Spec.HealthCheckNodePort = 34567
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid nodePort service with externalTrafficPolicy set",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeNodePort
 | 
						|
				s.Spec.ExternalTrafficPolicy = core.ServiceExternalTrafficPolicyTypeLocal
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "valid clusterIP service with none of externalTrafficPolicy and healthCheckNodePort set",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "cannot set healthCheckNodePort field on loadBalancer service with externalTrafficPolicy!=Local",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				s.Spec.ExternalTrafficPolicy = core.ServiceExternalTrafficPolicyTypeCluster
 | 
						|
				s.Spec.HealthCheckNodePort = 34567
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "cannot set healthCheckNodePort field on nodePort service",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeNodePort
 | 
						|
				s.Spec.ExternalTrafficPolicy = core.ServiceExternalTrafficPolicyTypeLocal
 | 
						|
				s.Spec.HealthCheckNodePort = 34567
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "cannot set externalTrafficPolicy or healthCheckNodePort fields on clusterIP service",
 | 
						|
			tweakSvc: func(s *core.Service) {
 | 
						|
				s.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
				s.Spec.ExternalTrafficPolicy = core.ServiceExternalTrafficPolicyTypeLocal
 | 
						|
				s.Spec.HealthCheckNodePort = 34567
 | 
						|
			},
 | 
						|
			numErrs: 2,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, tc := range testCases {
 | 
						|
		svc := makeValidService()
 | 
						|
		tc.tweakSvc(&svc)
 | 
						|
		errs := ValidateServiceExternalTrafficFieldsCombination(&svc)
 | 
						|
		if len(errs) != tc.numErrs {
 | 
						|
			t.Errorf("Unexpected error list for case %q: %v", tc.name, errs.ToAggregate())
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateReplicationControllerStatus(t *testing.T) {
 | 
						|
	tests := []struct {
 | 
						|
		name string
 | 
						|
 | 
						|
		replicas             int32
 | 
						|
		fullyLabeledReplicas int32
 | 
						|
		readyReplicas        int32
 | 
						|
		availableReplicas    int32
 | 
						|
		observedGeneration   int64
 | 
						|
 | 
						|
		expectedErr bool
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name:                 "valid status",
 | 
						|
			replicas:             3,
 | 
						|
			fullyLabeledReplicas: 3,
 | 
						|
			readyReplicas:        2,
 | 
						|
			availableReplicas:    1,
 | 
						|
			observedGeneration:   2,
 | 
						|
			expectedErr:          false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:                 "invalid replicas",
 | 
						|
			replicas:             -1,
 | 
						|
			fullyLabeledReplicas: 3,
 | 
						|
			readyReplicas:        2,
 | 
						|
			availableReplicas:    1,
 | 
						|
			observedGeneration:   2,
 | 
						|
			expectedErr:          true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:                 "invalid fullyLabeledReplicas",
 | 
						|
			replicas:             3,
 | 
						|
			fullyLabeledReplicas: -1,
 | 
						|
			readyReplicas:        2,
 | 
						|
			availableReplicas:    1,
 | 
						|
			observedGeneration:   2,
 | 
						|
			expectedErr:          true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:                 "invalid readyReplicas",
 | 
						|
			replicas:             3,
 | 
						|
			fullyLabeledReplicas: 3,
 | 
						|
			readyReplicas:        -1,
 | 
						|
			availableReplicas:    1,
 | 
						|
			observedGeneration:   2,
 | 
						|
			expectedErr:          true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:                 "invalid availableReplicas",
 | 
						|
			replicas:             3,
 | 
						|
			fullyLabeledReplicas: 3,
 | 
						|
			readyReplicas:        3,
 | 
						|
			availableReplicas:    -1,
 | 
						|
			observedGeneration:   2,
 | 
						|
			expectedErr:          true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:                 "invalid observedGeneration",
 | 
						|
			replicas:             3,
 | 
						|
			fullyLabeledReplicas: 3,
 | 
						|
			readyReplicas:        3,
 | 
						|
			availableReplicas:    3,
 | 
						|
			observedGeneration:   -1,
 | 
						|
			expectedErr:          true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:                 "fullyLabeledReplicas greater than replicas",
 | 
						|
			replicas:             3,
 | 
						|
			fullyLabeledReplicas: 4,
 | 
						|
			readyReplicas:        3,
 | 
						|
			availableReplicas:    3,
 | 
						|
			observedGeneration:   1,
 | 
						|
			expectedErr:          true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:                 "readyReplicas greater than replicas",
 | 
						|
			replicas:             3,
 | 
						|
			fullyLabeledReplicas: 3,
 | 
						|
			readyReplicas:        4,
 | 
						|
			availableReplicas:    3,
 | 
						|
			observedGeneration:   1,
 | 
						|
			expectedErr:          true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:                 "availableReplicas greater than replicas",
 | 
						|
			replicas:             3,
 | 
						|
			fullyLabeledReplicas: 3,
 | 
						|
			readyReplicas:        3,
 | 
						|
			availableReplicas:    4,
 | 
						|
			observedGeneration:   1,
 | 
						|
			expectedErr:          true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:                 "availableReplicas greater than readyReplicas",
 | 
						|
			replicas:             3,
 | 
						|
			fullyLabeledReplicas: 3,
 | 
						|
			readyReplicas:        2,
 | 
						|
			availableReplicas:    3,
 | 
						|
			observedGeneration:   1,
 | 
						|
			expectedErr:          true,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		status := core.ReplicationControllerStatus{
 | 
						|
			Replicas:             test.replicas,
 | 
						|
			FullyLabeledReplicas: test.fullyLabeledReplicas,
 | 
						|
			ReadyReplicas:        test.readyReplicas,
 | 
						|
			AvailableReplicas:    test.availableReplicas,
 | 
						|
			ObservedGeneration:   test.observedGeneration,
 | 
						|
		}
 | 
						|
 | 
						|
		if hasErr := len(ValidateReplicationControllerStatus(status, field.NewPath("status"))) > 0; hasErr != test.expectedErr {
 | 
						|
			t.Errorf("%s: expected error: %t, got error: %t", test.name, test.expectedErr, hasErr)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateReplicationControllerStatusUpdate(t *testing.T) {
 | 
						|
	validSelector := map[string]string{"a": "b"}
 | 
						|
	validPodTemplate := core.PodTemplate{
 | 
						|
		Template: core.PodTemplateSpec{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Labels: validSelector,
 | 
						|
			},
 | 
						|
			Spec: core.PodSpec{
 | 
						|
				RestartPolicy: core.RestartPolicyAlways,
 | 
						|
				DNSPolicy:     core.DNSClusterFirst,
 | 
						|
				Containers:    []core.Container{{Name: "abc", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	type rcUpdateTest struct {
 | 
						|
		old    core.ReplicationController
 | 
						|
		update core.ReplicationController
 | 
						|
	}
 | 
						|
	successCases := []rcUpdateTest{
 | 
						|
		{
 | 
						|
			old: core.ReplicationController{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: metav1.NamespaceDefault},
 | 
						|
				Spec: core.ReplicationControllerSpec{
 | 
						|
					Selector: validSelector,
 | 
						|
					Template: &validPodTemplate.Template,
 | 
						|
				},
 | 
						|
				Status: core.ReplicationControllerStatus{
 | 
						|
					Replicas: 2,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			update: core.ReplicationController{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: metav1.NamespaceDefault},
 | 
						|
				Spec: core.ReplicationControllerSpec{
 | 
						|
					Replicas: 3,
 | 
						|
					Selector: validSelector,
 | 
						|
					Template: &validPodTemplate.Template,
 | 
						|
				},
 | 
						|
				Status: core.ReplicationControllerStatus{
 | 
						|
					Replicas: 4,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for _, successCase := range successCases {
 | 
						|
		successCase.old.ObjectMeta.ResourceVersion = "1"
 | 
						|
		successCase.update.ObjectMeta.ResourceVersion = "1"
 | 
						|
		if errs := ValidateReplicationControllerStatusUpdate(&successCase.update, &successCase.old); len(errs) != 0 {
 | 
						|
			t.Errorf("expected success: %v", errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	errorCases := map[string]rcUpdateTest{
 | 
						|
		"negative replicas": {
 | 
						|
			old: core.ReplicationController{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "", Namespace: metav1.NamespaceDefault},
 | 
						|
				Spec: core.ReplicationControllerSpec{
 | 
						|
					Selector: validSelector,
 | 
						|
					Template: &validPodTemplate.Template,
 | 
						|
				},
 | 
						|
				Status: core.ReplicationControllerStatus{
 | 
						|
					Replicas: 3,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			update: core.ReplicationController{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: metav1.NamespaceDefault},
 | 
						|
				Spec: core.ReplicationControllerSpec{
 | 
						|
					Replicas: 2,
 | 
						|
					Selector: validSelector,
 | 
						|
					Template: &validPodTemplate.Template,
 | 
						|
				},
 | 
						|
				Status: core.ReplicationControllerStatus{
 | 
						|
					Replicas: -3,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for testName, errorCase := range errorCases {
 | 
						|
		if errs := ValidateReplicationControllerStatusUpdate(&errorCase.update, &errorCase.old); len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure: %s", testName)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateReplicationControllerUpdate(t *testing.T) {
 | 
						|
	validSelector := map[string]string{"a": "b"}
 | 
						|
	validPodTemplate := core.PodTemplate{
 | 
						|
		Template: core.PodTemplateSpec{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Labels: validSelector,
 | 
						|
			},
 | 
						|
			Spec: core.PodSpec{
 | 
						|
				RestartPolicy: core.RestartPolicyAlways,
 | 
						|
				DNSPolicy:     core.DNSClusterFirst,
 | 
						|
				Containers:    []core.Container{{Name: "abc", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	readWriteVolumePodTemplate := core.PodTemplate{
 | 
						|
		Template: core.PodTemplateSpec{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Labels: validSelector,
 | 
						|
			},
 | 
						|
			Spec: core.PodSpec{
 | 
						|
				RestartPolicy: core.RestartPolicyAlways,
 | 
						|
				DNSPolicy:     core.DNSClusterFirst,
 | 
						|
				Containers:    []core.Container{{Name: "abc", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
				Volumes:       []core.Volume{{Name: "gcepd", VolumeSource: core.VolumeSource{GCEPersistentDisk: &core.GCEPersistentDiskVolumeSource{PDName: "my-PD", FSType: "ext4", Partition: 1, ReadOnly: false}}}},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	invalidSelector := map[string]string{"NoUppercaseOrSpecialCharsLike=Equals": "b"}
 | 
						|
	invalidPodTemplate := core.PodTemplate{
 | 
						|
		Template: core.PodTemplateSpec{
 | 
						|
			Spec: core.PodSpec{
 | 
						|
				RestartPolicy: core.RestartPolicyAlways,
 | 
						|
				DNSPolicy:     core.DNSClusterFirst,
 | 
						|
			},
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Labels: invalidSelector,
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	type rcUpdateTest struct {
 | 
						|
		old    core.ReplicationController
 | 
						|
		update core.ReplicationController
 | 
						|
	}
 | 
						|
	successCases := []rcUpdateTest{
 | 
						|
		{
 | 
						|
			old: core.ReplicationController{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: metav1.NamespaceDefault},
 | 
						|
				Spec: core.ReplicationControllerSpec{
 | 
						|
					Selector: validSelector,
 | 
						|
					Template: &validPodTemplate.Template,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			update: core.ReplicationController{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: metav1.NamespaceDefault},
 | 
						|
				Spec: core.ReplicationControllerSpec{
 | 
						|
					Replicas: 3,
 | 
						|
					Selector: validSelector,
 | 
						|
					Template: &validPodTemplate.Template,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			old: core.ReplicationController{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: metav1.NamespaceDefault},
 | 
						|
				Spec: core.ReplicationControllerSpec{
 | 
						|
					Selector: validSelector,
 | 
						|
					Template: &validPodTemplate.Template,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			update: core.ReplicationController{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: metav1.NamespaceDefault},
 | 
						|
				Spec: core.ReplicationControllerSpec{
 | 
						|
					Replicas: 1,
 | 
						|
					Selector: validSelector,
 | 
						|
					Template: &readWriteVolumePodTemplate.Template,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for _, successCase := range successCases {
 | 
						|
		successCase.old.ObjectMeta.ResourceVersion = "1"
 | 
						|
		successCase.update.ObjectMeta.ResourceVersion = "1"
 | 
						|
		if errs := ValidateReplicationControllerUpdate(&successCase.update, &successCase.old); len(errs) != 0 {
 | 
						|
			t.Errorf("expected success: %v", errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	errorCases := map[string]rcUpdateTest{
 | 
						|
		"more than one read/write": {
 | 
						|
			old: core.ReplicationController{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "", Namespace: metav1.NamespaceDefault},
 | 
						|
				Spec: core.ReplicationControllerSpec{
 | 
						|
					Selector: validSelector,
 | 
						|
					Template: &validPodTemplate.Template,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			update: core.ReplicationController{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: metav1.NamespaceDefault},
 | 
						|
				Spec: core.ReplicationControllerSpec{
 | 
						|
					Replicas: 2,
 | 
						|
					Selector: validSelector,
 | 
						|
					Template: &readWriteVolumePodTemplate.Template,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid selector": {
 | 
						|
			old: core.ReplicationController{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "", Namespace: metav1.NamespaceDefault},
 | 
						|
				Spec: core.ReplicationControllerSpec{
 | 
						|
					Selector: validSelector,
 | 
						|
					Template: &validPodTemplate.Template,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			update: core.ReplicationController{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: metav1.NamespaceDefault},
 | 
						|
				Spec: core.ReplicationControllerSpec{
 | 
						|
					Replicas: 2,
 | 
						|
					Selector: invalidSelector,
 | 
						|
					Template: &validPodTemplate.Template,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid pod": {
 | 
						|
			old: core.ReplicationController{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "", Namespace: metav1.NamespaceDefault},
 | 
						|
				Spec: core.ReplicationControllerSpec{
 | 
						|
					Selector: validSelector,
 | 
						|
					Template: &validPodTemplate.Template,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			update: core.ReplicationController{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: metav1.NamespaceDefault},
 | 
						|
				Spec: core.ReplicationControllerSpec{
 | 
						|
					Replicas: 2,
 | 
						|
					Selector: validSelector,
 | 
						|
					Template: &invalidPodTemplate.Template,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"negative replicas": {
 | 
						|
			old: core.ReplicationController{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: metav1.NamespaceDefault},
 | 
						|
				Spec: core.ReplicationControllerSpec{
 | 
						|
					Selector: validSelector,
 | 
						|
					Template: &validPodTemplate.Template,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			update: core.ReplicationController{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: metav1.NamespaceDefault},
 | 
						|
				Spec: core.ReplicationControllerSpec{
 | 
						|
					Replicas: -1,
 | 
						|
					Selector: validSelector,
 | 
						|
					Template: &validPodTemplate.Template,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for testName, errorCase := range errorCases {
 | 
						|
		if errs := ValidateReplicationControllerUpdate(&errorCase.update, &errorCase.old); len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure: %s", testName)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateReplicationController(t *testing.T) {
 | 
						|
	validSelector := map[string]string{"a": "b"}
 | 
						|
	validPodTemplate := core.PodTemplate{
 | 
						|
		Template: core.PodTemplateSpec{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Labels: validSelector,
 | 
						|
			},
 | 
						|
			Spec: core.PodSpec{
 | 
						|
				RestartPolicy: core.RestartPolicyAlways,
 | 
						|
				DNSPolicy:     core.DNSClusterFirst,
 | 
						|
				Containers:    []core.Container{{Name: "abc", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	readWriteVolumePodTemplate := core.PodTemplate{
 | 
						|
		Template: core.PodTemplateSpec{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Labels: validSelector,
 | 
						|
			},
 | 
						|
			Spec: core.PodSpec{
 | 
						|
				Volumes:       []core.Volume{{Name: "gcepd", VolumeSource: core.VolumeSource{GCEPersistentDisk: &core.GCEPersistentDiskVolumeSource{PDName: "my-PD", FSType: "ext4", Partition: 1, ReadOnly: false}}}},
 | 
						|
				RestartPolicy: core.RestartPolicyAlways,
 | 
						|
				DNSPolicy:     core.DNSClusterFirst,
 | 
						|
				Containers:    []core.Container{{Name: "abc", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	invalidSelector := map[string]string{"NoUppercaseOrSpecialCharsLike=Equals": "b"}
 | 
						|
	invalidPodTemplate := core.PodTemplate{
 | 
						|
		Template: core.PodTemplateSpec{
 | 
						|
			Spec: core.PodSpec{
 | 
						|
				RestartPolicy: core.RestartPolicyAlways,
 | 
						|
				DNSPolicy:     core.DNSClusterFirst,
 | 
						|
			},
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Labels: invalidSelector,
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	successCases := []core.ReplicationController{
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: metav1.NamespaceDefault},
 | 
						|
			Spec: core.ReplicationControllerSpec{
 | 
						|
				Selector: validSelector,
 | 
						|
				Template: &validPodTemplate.Template,
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "abc-123", Namespace: metav1.NamespaceDefault},
 | 
						|
			Spec: core.ReplicationControllerSpec{
 | 
						|
				Selector: validSelector,
 | 
						|
				Template: &validPodTemplate.Template,
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "abc-123", Namespace: metav1.NamespaceDefault},
 | 
						|
			Spec: core.ReplicationControllerSpec{
 | 
						|
				Replicas: 1,
 | 
						|
				Selector: validSelector,
 | 
						|
				Template: &readWriteVolumePodTemplate.Template,
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for _, successCase := range successCases {
 | 
						|
		if errs := ValidateReplicationController(&successCase); len(errs) != 0 {
 | 
						|
			t.Errorf("expected success: %v", errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	errorCases := map[string]core.ReplicationController{
 | 
						|
		"zero-length ID": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "", Namespace: metav1.NamespaceDefault},
 | 
						|
			Spec: core.ReplicationControllerSpec{
 | 
						|
				Selector: validSelector,
 | 
						|
				Template: &validPodTemplate.Template,
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"missing-namespace": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "abc-123"},
 | 
						|
			Spec: core.ReplicationControllerSpec{
 | 
						|
				Selector: validSelector,
 | 
						|
				Template: &validPodTemplate.Template,
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"empty selector": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: metav1.NamespaceDefault},
 | 
						|
			Spec: core.ReplicationControllerSpec{
 | 
						|
				Template: &validPodTemplate.Template,
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"selector_doesnt_match": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: metav1.NamespaceDefault},
 | 
						|
			Spec: core.ReplicationControllerSpec{
 | 
						|
				Selector: map[string]string{"foo": "bar"},
 | 
						|
				Template: &validPodTemplate.Template,
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid manifest": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: metav1.NamespaceDefault},
 | 
						|
			Spec: core.ReplicationControllerSpec{
 | 
						|
				Selector: validSelector,
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"read-write persistent disk with > 1 pod": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "abc"},
 | 
						|
			Spec: core.ReplicationControllerSpec{
 | 
						|
				Replicas: 2,
 | 
						|
				Selector: validSelector,
 | 
						|
				Template: &readWriteVolumePodTemplate.Template,
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"negative_replicas": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: metav1.NamespaceDefault},
 | 
						|
			Spec: core.ReplicationControllerSpec{
 | 
						|
				Replicas: -1,
 | 
						|
				Selector: validSelector,
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid_label": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "abc-123",
 | 
						|
				Namespace: metav1.NamespaceDefault,
 | 
						|
				Labels: map[string]string{
 | 
						|
					"NoUppercaseOrSpecialCharsLike=Equals": "bar",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Spec: core.ReplicationControllerSpec{
 | 
						|
				Selector: validSelector,
 | 
						|
				Template: &validPodTemplate.Template,
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid_label 2": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "abc-123",
 | 
						|
				Namespace: metav1.NamespaceDefault,
 | 
						|
				Labels: map[string]string{
 | 
						|
					"NoUppercaseOrSpecialCharsLike=Equals": "bar",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Spec: core.ReplicationControllerSpec{
 | 
						|
				Template: &invalidPodTemplate.Template,
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid_annotation": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "abc-123",
 | 
						|
				Namespace: metav1.NamespaceDefault,
 | 
						|
				Annotations: map[string]string{
 | 
						|
					"NoUppercaseOrSpecialCharsLike=Equals": "bar",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Spec: core.ReplicationControllerSpec{
 | 
						|
				Selector: validSelector,
 | 
						|
				Template: &validPodTemplate.Template,
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid restart policy 1": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "abc-123",
 | 
						|
				Namespace: metav1.NamespaceDefault,
 | 
						|
			},
 | 
						|
			Spec: core.ReplicationControllerSpec{
 | 
						|
				Selector: validSelector,
 | 
						|
				Template: &core.PodTemplateSpec{
 | 
						|
					Spec: core.PodSpec{
 | 
						|
						RestartPolicy: core.RestartPolicyOnFailure,
 | 
						|
						DNSPolicy:     core.DNSClusterFirst,
 | 
						|
						Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
					},
 | 
						|
					ObjectMeta: metav1.ObjectMeta{
 | 
						|
						Labels: validSelector,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid restart policy 2": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "abc-123",
 | 
						|
				Namespace: metav1.NamespaceDefault,
 | 
						|
			},
 | 
						|
			Spec: core.ReplicationControllerSpec{
 | 
						|
				Selector: validSelector,
 | 
						|
				Template: &core.PodTemplateSpec{
 | 
						|
					Spec: core.PodSpec{
 | 
						|
						RestartPolicy: core.RestartPolicyNever,
 | 
						|
						DNSPolicy:     core.DNSClusterFirst,
 | 
						|
						Containers:    []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
 | 
						|
					},
 | 
						|
					ObjectMeta: metav1.ObjectMeta{
 | 
						|
						Labels: validSelector,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for k, v := range errorCases {
 | 
						|
		errs := ValidateReplicationController(&v)
 | 
						|
		if len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure for %s", k)
 | 
						|
		}
 | 
						|
		for i := range errs {
 | 
						|
			field := errs[i].Field
 | 
						|
			if !strings.HasPrefix(field, "spec.template.") &&
 | 
						|
				field != "metadata.name" &&
 | 
						|
				field != "metadata.namespace" &&
 | 
						|
				field != "spec.selector" &&
 | 
						|
				field != "spec.template" &&
 | 
						|
				field != "GCEPersistentDisk.ReadOnly" &&
 | 
						|
				field != "spec.replicas" &&
 | 
						|
				field != "spec.template.labels" &&
 | 
						|
				field != "metadata.annotations" &&
 | 
						|
				field != "metadata.labels" &&
 | 
						|
				field != "status.replicas" {
 | 
						|
				t.Errorf("%s: missing prefix for: %v", k, errs[i])
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateNode(t *testing.T) {
 | 
						|
	validSelector := map[string]string{"a": "b"}
 | 
						|
	invalidSelector := map[string]string{"NoUppercaseOrSpecialCharsLike=Equals": "b"}
 | 
						|
	successCases := []core.Node{
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "abc",
 | 
						|
				Labels: validSelector,
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Addresses: []core.NodeAddress{
 | 
						|
					{Type: core.NodeExternalIP, Address: "something"},
 | 
						|
				},
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("10G"),
 | 
						|
					core.ResourceName("my.org/gpu"):        resource.MustParse("10"),
 | 
						|
					core.ResourceName("hugepages-2Mi"):     resource.MustParse("10Gi"),
 | 
						|
					core.ResourceName("hugepages-1Gi"):     resource.MustParse("0"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "abc",
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Addresses: []core.NodeAddress{
 | 
						|
					{Type: core.NodeExternalIP, Address: "something"},
 | 
						|
				},
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("0"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "dedicated-node1",
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Addresses: []core.NodeAddress{
 | 
						|
					{Type: core.NodeExternalIP, Address: "something"},
 | 
						|
				},
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("0"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Spec: core.NodeSpec{
 | 
						|
				// Add a valid taint to a node
 | 
						|
				Taints: []core.Taint{{Key: "GPU", Value: "true", Effect: "NoSchedule"}},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "abc",
 | 
						|
				Annotations: map[string]string{
 | 
						|
					core.PreferAvoidPodsAnnotationKey: `
 | 
						|
							{
 | 
						|
							    "preferAvoidPods": [
 | 
						|
							        {
 | 
						|
							            "podSignature": {
 | 
						|
							                "podController": {
 | 
						|
							                    "apiVersion": "v1",
 | 
						|
							                    "kind": "ReplicationController",
 | 
						|
							                    "name": "foo",
 | 
						|
							                    "uid": "abcdef123456",
 | 
						|
							                    "controller": true
 | 
						|
							                }
 | 
						|
							            },
 | 
						|
							            "reason": "some reason",
 | 
						|
							            "message": "some message"
 | 
						|
							        }
 | 
						|
							    ]
 | 
						|
							}`,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Addresses: []core.NodeAddress{
 | 
						|
					{Type: core.NodeExternalIP, Address: "something"},
 | 
						|
				},
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("0"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "abc",
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Addresses: []core.NodeAddress{
 | 
						|
					{Type: core.NodeExternalIP, Address: "something"},
 | 
						|
				},
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("0"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Spec: core.NodeSpec{
 | 
						|
				PodCIDR: "192.168.0.0/16",
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for _, successCase := range successCases {
 | 
						|
		if errs := ValidateNode(&successCase); len(errs) != 0 {
 | 
						|
			t.Errorf("expected success: %v", errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	errorCases := map[string]core.Node{
 | 
						|
		"zero-length Name": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "",
 | 
						|
				Labels: validSelector,
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Addresses: []core.NodeAddress{},
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid-labels": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "abc-123",
 | 
						|
				Labels: invalidSelector,
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("10G"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"missing-taint-key": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "dedicated-node1",
 | 
						|
			},
 | 
						|
			Spec: core.NodeSpec{
 | 
						|
				// Add a taint with an empty key to a node
 | 
						|
				Taints: []core.Taint{{Key: "", Value: "special-user-1", Effect: "NoSchedule"}},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"bad-taint-key": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "dedicated-node1",
 | 
						|
			},
 | 
						|
			Spec: core.NodeSpec{
 | 
						|
				// Add a taint with an invalid  key to a node
 | 
						|
				Taints: []core.Taint{{Key: "NoUppercaseOrSpecialCharsLike=Equals", Value: "special-user-1", Effect: "NoSchedule"}},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"bad-taint-value": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "dedicated-node2",
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Addresses: []core.NodeAddress{
 | 
						|
					{Type: core.NodeExternalIP, Address: "something"},
 | 
						|
				},
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("0"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Spec: core.NodeSpec{
 | 
						|
				// Add a taint with a bad value to a node
 | 
						|
				Taints: []core.Taint{{Key: "dedicated", Value: "some\\bad\\value", Effect: "NoSchedule"}},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"missing-taint-effect": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "dedicated-node3",
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Addresses: []core.NodeAddress{
 | 
						|
					{Type: core.NodeExternalIP, Address: "something"},
 | 
						|
				},
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("0"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Spec: core.NodeSpec{
 | 
						|
				// Add a taint with an empty effect to a node
 | 
						|
				Taints: []core.Taint{{Key: "dedicated", Value: "special-user-3", Effect: ""}},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid-taint-effect": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "dedicated-node3",
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Addresses: []core.NodeAddress{
 | 
						|
					{Type: core.NodeExternalIP, Address: "something"},
 | 
						|
				},
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("0"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Spec: core.NodeSpec{
 | 
						|
				// Add a taint with NoExecute effect to a node
 | 
						|
				Taints: []core.Taint{{Key: "dedicated", Value: "special-user-3", Effect: "NoScheduleNoAdmit"}},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"duplicated-taints-with-same-key-effect": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "dedicated-node1",
 | 
						|
			},
 | 
						|
			Spec: core.NodeSpec{
 | 
						|
				// Add two taints to the node with the same key and effect; should be rejected.
 | 
						|
				Taints: []core.Taint{
 | 
						|
					{Key: "dedicated", Value: "special-user-1", Effect: "NoSchedule"},
 | 
						|
					{Key: "dedicated", Value: "special-user-2", Effect: "NoSchedule"},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"missing-podSignature": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "abc-123",
 | 
						|
				Annotations: map[string]string{
 | 
						|
					core.PreferAvoidPodsAnnotationKey: `
 | 
						|
							{
 | 
						|
							    "preferAvoidPods": [
 | 
						|
							        {
 | 
						|
							            "reason": "some reason",
 | 
						|
							            "message": "some message"
 | 
						|
							        }
 | 
						|
							    ]
 | 
						|
							}`,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Addresses: []core.NodeAddress{},
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("0"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid-podController": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "abc-123",
 | 
						|
				Annotations: map[string]string{
 | 
						|
					core.PreferAvoidPodsAnnotationKey: `
 | 
						|
							{
 | 
						|
							    "preferAvoidPods": [
 | 
						|
							        {
 | 
						|
							            "podSignature": {
 | 
						|
							                "podController": {
 | 
						|
							                    "apiVersion": "v1",
 | 
						|
							                    "kind": "ReplicationController",
 | 
						|
							                    "name": "foo",
 | 
						|
                                                                           "uid": "abcdef123456",
 | 
						|
                                                                           "controller": false
 | 
						|
							                }
 | 
						|
							            },
 | 
						|
							            "reason": "some reason",
 | 
						|
							            "message": "some message"
 | 
						|
							        }
 | 
						|
							    ]
 | 
						|
							}`,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Addresses: []core.NodeAddress{},
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("0"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"multiple-pre-allocated-hugepages": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "abc",
 | 
						|
				Labels: validSelector,
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Addresses: []core.NodeAddress{
 | 
						|
					{Type: core.NodeExternalIP, Address: "something"},
 | 
						|
				},
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("10G"),
 | 
						|
					core.ResourceName("my.org/gpu"):        resource.MustParse("10"),
 | 
						|
					core.ResourceName("hugepages-2Mi"):     resource.MustParse("10Gi"),
 | 
						|
					core.ResourceName("hugepages-1Gi"):     resource.MustParse("10Gi"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"invalid-pod-cidr": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "abc",
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Addresses: []core.NodeAddress{
 | 
						|
					{Type: core.NodeExternalIP, Address: "something"},
 | 
						|
				},
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("0"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Spec: core.NodeSpec{
 | 
						|
				PodCIDR: "192.168.0.0",
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for k, v := range errorCases {
 | 
						|
		errs := ValidateNode(&v)
 | 
						|
		if len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure for %s", k)
 | 
						|
		}
 | 
						|
		for i := range errs {
 | 
						|
			field := errs[i].Field
 | 
						|
			expectedFields := map[string]bool{
 | 
						|
				"metadata.name":                                                                                               true,
 | 
						|
				"metadata.labels":                                                                                             true,
 | 
						|
				"metadata.annotations":                                                                                        true,
 | 
						|
				"metadata.namespace":                                                                                          true,
 | 
						|
				"spec.externalID":                                                                                             true,
 | 
						|
				"spec.taints[0].key":                                                                                          true,
 | 
						|
				"spec.taints[0].value":                                                                                        true,
 | 
						|
				"spec.taints[0].effect":                                                                                       true,
 | 
						|
				"metadata.annotations.scheduler.alpha.kubernetes.io/preferAvoidPods[0].PodSignature":                          true,
 | 
						|
				"metadata.annotations.scheduler.alpha.kubernetes.io/preferAvoidPods[0].PodSignature.PodController.Controller": true,
 | 
						|
			}
 | 
						|
			if val, ok := expectedFields[field]; ok {
 | 
						|
				if !val {
 | 
						|
					t.Errorf("%s: missing prefix for: %v", k, errs[i])
 | 
						|
				}
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateNodeUpdate(t *testing.T) {
 | 
						|
	tests := []struct {
 | 
						|
		oldNode core.Node
 | 
						|
		node    core.Node
 | 
						|
		valid   bool
 | 
						|
	}{
 | 
						|
		{core.Node{}, core.Node{}, true},
 | 
						|
		{core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo"}},
 | 
						|
			core.Node{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "bar"},
 | 
						|
			}, false},
 | 
						|
		{core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "foo",
 | 
						|
				Labels: map[string]string{"foo": "bar"},
 | 
						|
			},
 | 
						|
		}, core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "foo",
 | 
						|
				Labels: map[string]string{"foo": "baz"},
 | 
						|
			},
 | 
						|
		}, true},
 | 
						|
		{core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo",
 | 
						|
			},
 | 
						|
		}, core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "foo",
 | 
						|
				Labels: map[string]string{"foo": "baz"},
 | 
						|
			},
 | 
						|
		}, true},
 | 
						|
		{core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "foo",
 | 
						|
				Labels: map[string]string{"bar": "foo"},
 | 
						|
			},
 | 
						|
		}, core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "foo",
 | 
						|
				Labels: map[string]string{"foo": "baz"},
 | 
						|
			},
 | 
						|
		}, true},
 | 
						|
		{core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo",
 | 
						|
			},
 | 
						|
			Spec: core.NodeSpec{
 | 
						|
				PodCIDR: "",
 | 
						|
			},
 | 
						|
		}, core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo",
 | 
						|
			},
 | 
						|
			Spec: core.NodeSpec{
 | 
						|
				PodCIDR: "192.168.0.0/16",
 | 
						|
			},
 | 
						|
		}, true},
 | 
						|
		{core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo",
 | 
						|
			},
 | 
						|
			Spec: core.NodeSpec{
 | 
						|
				PodCIDR: "192.123.0.0/16",
 | 
						|
			},
 | 
						|
		}, core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo",
 | 
						|
			},
 | 
						|
			Spec: core.NodeSpec{
 | 
						|
				PodCIDR: "192.168.0.0/16",
 | 
						|
			},
 | 
						|
		}, false},
 | 
						|
		{core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo",
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceCPU:    resource.MustParse("10000"),
 | 
						|
					core.ResourceMemory: resource.MustParse("100"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		}, core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo",
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceCPU:    resource.MustParse("100"),
 | 
						|
					core.ResourceMemory: resource.MustParse("10000"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		}, true},
 | 
						|
		{core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "foo",
 | 
						|
				Labels: map[string]string{"bar": "foo"},
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceCPU:    resource.MustParse("10000"),
 | 
						|
					core.ResourceMemory: resource.MustParse("100"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		}, core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "foo",
 | 
						|
				Labels: map[string]string{"bar": "fooobaz"},
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceCPU:    resource.MustParse("100"),
 | 
						|
					core.ResourceMemory: resource.MustParse("10000"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		}, true},
 | 
						|
		{core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "foo",
 | 
						|
				Labels: map[string]string{"bar": "foo"},
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Addresses: []core.NodeAddress{
 | 
						|
					{Type: core.NodeExternalIP, Address: "1.2.3.4"},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		}, core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "foo",
 | 
						|
				Labels: map[string]string{"bar": "fooobaz"},
 | 
						|
			},
 | 
						|
		}, true},
 | 
						|
		{core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "foo",
 | 
						|
				Labels: map[string]string{"foo": "baz"},
 | 
						|
			},
 | 
						|
		}, core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "foo",
 | 
						|
				Labels: map[string]string{"Foo": "baz"},
 | 
						|
			},
 | 
						|
		}, true},
 | 
						|
		{core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo",
 | 
						|
			},
 | 
						|
			Spec: core.NodeSpec{
 | 
						|
				Unschedulable: false,
 | 
						|
			},
 | 
						|
		}, core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo",
 | 
						|
			},
 | 
						|
			Spec: core.NodeSpec{
 | 
						|
				Unschedulable: true,
 | 
						|
			},
 | 
						|
		}, true},
 | 
						|
		{core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo",
 | 
						|
			},
 | 
						|
			Spec: core.NodeSpec{
 | 
						|
				Unschedulable: false,
 | 
						|
			},
 | 
						|
		}, core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo",
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Addresses: []core.NodeAddress{
 | 
						|
					{Type: core.NodeExternalIP, Address: "1.1.1.1"},
 | 
						|
					{Type: core.NodeExternalIP, Address: "1.1.1.1"},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		}, false},
 | 
						|
		{core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo",
 | 
						|
			},
 | 
						|
			Spec: core.NodeSpec{
 | 
						|
				Unschedulable: false,
 | 
						|
			},
 | 
						|
		}, core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo",
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Addresses: []core.NodeAddress{
 | 
						|
					{Type: core.NodeExternalIP, Address: "1.1.1.1"},
 | 
						|
					{Type: core.NodeInternalIP, Address: "10.1.1.1"},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		}, true},
 | 
						|
		{core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo",
 | 
						|
			},
 | 
						|
		}, core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo",
 | 
						|
				Annotations: map[string]string{
 | 
						|
					core.PreferAvoidPodsAnnotationKey: `
 | 
						|
							{
 | 
						|
							    "preferAvoidPods": [
 | 
						|
							        {
 | 
						|
							            "podSignature": {
 | 
						|
							                "podController": {
 | 
						|
							                    "apiVersion": "v1",
 | 
						|
							                    "kind": "ReplicationController",
 | 
						|
							                    "name": "foo",
 | 
						|
                                                                           "uid": "abcdef123456",
 | 
						|
                                                                           "controller": true
 | 
						|
							                }
 | 
						|
							            },
 | 
						|
							            "reason": "some reason",
 | 
						|
							            "message": "some message"
 | 
						|
							        }
 | 
						|
							    ]
 | 
						|
							}`,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Spec: core.NodeSpec{
 | 
						|
				Unschedulable: false,
 | 
						|
			},
 | 
						|
		}, true},
 | 
						|
		{core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo",
 | 
						|
			},
 | 
						|
		}, core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo",
 | 
						|
				Annotations: map[string]string{
 | 
						|
					core.PreferAvoidPodsAnnotationKey: `
 | 
						|
							{
 | 
						|
							    "preferAvoidPods": [
 | 
						|
							        {
 | 
						|
							            "reason": "some reason",
 | 
						|
							            "message": "some message"
 | 
						|
							        }
 | 
						|
							    ]
 | 
						|
							}`,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		}, false},
 | 
						|
		{core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo",
 | 
						|
			},
 | 
						|
		}, core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo",
 | 
						|
				Annotations: map[string]string{
 | 
						|
					core.PreferAvoidPodsAnnotationKey: `
 | 
						|
							{
 | 
						|
							    "preferAvoidPods": [
 | 
						|
							        {
 | 
						|
							            "podSignature": {
 | 
						|
							                "podController": {
 | 
						|
							                    "apiVersion": "v1",
 | 
						|
							                    "kind": "ReplicationController",
 | 
						|
							                    "name": "foo",
 | 
						|
							                    "uid": "abcdef123456",
 | 
						|
							                    "controller": false
 | 
						|
							                }
 | 
						|
							            },
 | 
						|
							            "reason": "some reason",
 | 
						|
							            "message": "some message"
 | 
						|
							        }
 | 
						|
							    ]
 | 
						|
							}`,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		}, false},
 | 
						|
		{core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "valid-extended-resources",
 | 
						|
			},
 | 
						|
		}, core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "valid-extended-resources",
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("10G"),
 | 
						|
					core.ResourceName("example.com/a"):     resource.MustParse("5"),
 | 
						|
					core.ResourceName("example.com/b"):     resource.MustParse("10"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		}, true},
 | 
						|
		{core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "invalid-fractional-extended-capacity",
 | 
						|
			},
 | 
						|
		}, core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "invalid-fractional-extended-capacity",
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("10G"),
 | 
						|
					core.ResourceName("example.com/a"):     resource.MustParse("500m"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		}, false},
 | 
						|
		{core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "invalid-fractional-extended-allocatable",
 | 
						|
			},
 | 
						|
		}, core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "invalid-fractional-extended-allocatable",
 | 
						|
			},
 | 
						|
			Status: core.NodeStatus{
 | 
						|
				Capacity: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("10G"),
 | 
						|
					core.ResourceName("example.com/a"):     resource.MustParse("5"),
 | 
						|
				},
 | 
						|
				Allocatable: core.ResourceList{
 | 
						|
					core.ResourceName(core.ResourceCPU):    resource.MustParse("10"),
 | 
						|
					core.ResourceName(core.ResourceMemory): resource.MustParse("10G"),
 | 
						|
					core.ResourceName("example.com/a"):     resource.MustParse("4.5"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		}, false},
 | 
						|
		{core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "update-provider-id-when-not-set",
 | 
						|
			},
 | 
						|
		}, core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "update-provider-id-when-not-set",
 | 
						|
			},
 | 
						|
			Spec: core.NodeSpec{
 | 
						|
				ProviderID: "provider:///new",
 | 
						|
			},
 | 
						|
		}, true},
 | 
						|
		{core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "update-provider-id-when-set",
 | 
						|
			},
 | 
						|
			Spec: core.NodeSpec{
 | 
						|
				ProviderID: "provider:///old",
 | 
						|
			},
 | 
						|
		}, core.Node{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "update-provider-id-when-set",
 | 
						|
			},
 | 
						|
			Spec: core.NodeSpec{
 | 
						|
				ProviderID: "provider:///new",
 | 
						|
			},
 | 
						|
		}, false},
 | 
						|
	}
 | 
						|
	for i, test := range tests {
 | 
						|
		test.oldNode.ObjectMeta.ResourceVersion = "1"
 | 
						|
		test.node.ObjectMeta.ResourceVersion = "1"
 | 
						|
		errs := ValidateNodeUpdate(&test.node, &test.oldNode)
 | 
						|
		if test.valid && len(errs) > 0 {
 | 
						|
			t.Errorf("%d: Unexpected error: %v", i, errs)
 | 
						|
			t.Logf("%#v vs %#v", test.oldNode.ObjectMeta, test.node.ObjectMeta)
 | 
						|
		}
 | 
						|
		if !test.valid && len(errs) == 0 {
 | 
						|
			t.Errorf("%d: Unexpected non-error", i)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateServiceUpdate(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		name     string
 | 
						|
		tweakSvc func(oldSvc, newSvc *core.Service) // given basic valid services, each test case can customize them
 | 
						|
		numErrs  int
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name: "no change",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				// do nothing
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "change name",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				newSvc.Name += "2"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "change namespace",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				newSvc.Namespace += "2"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "change label valid",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				newSvc.Labels["key"] = "other-value"
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "add label",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				newSvc.Labels["key2"] = "value2"
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "change cluster IP",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.ClusterIP = "1.2.3.4"
 | 
						|
				newSvc.Spec.ClusterIP = "8.6.7.5"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "remove cluster IP",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.ClusterIP = "1.2.3.4"
 | 
						|
				newSvc.Spec.ClusterIP = ""
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "change affinity",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				newSvc.Spec.SessionAffinity = "ClientIP"
 | 
						|
				newSvc.Spec.SessionAffinityConfig = &core.SessionAffinityConfig{
 | 
						|
					ClientIP: &core.ClientIPConfig{
 | 
						|
						TimeoutSeconds: utilpointer.Int32Ptr(90),
 | 
						|
					},
 | 
						|
				}
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "remove affinity",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				newSvc.Spec.SessionAffinity = ""
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "change type",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "remove type",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				newSvc.Spec.Type = ""
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "change type -> nodeport",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeNodePort
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "add loadBalancerSourceRanges",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				newSvc.Spec.LoadBalancerSourceRanges = []string{"10.0.0.0/8"}
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "update loadBalancerSourceRanges",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				oldSvc.Spec.LoadBalancerSourceRanges = []string{"10.0.0.0/8"}
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				newSvc.Spec.LoadBalancerSourceRanges = []string{"10.100.0.0/16"}
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "LoadBalancer type cannot have None ClusterIP",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				newSvc.Spec.ClusterIP = "None"
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "`None` ClusterIP cannot be changed",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.ClusterIP = "None"
 | 
						|
				newSvc.Spec.ClusterIP = "1.2.3.4"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "`None` ClusterIP cannot be removed",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.ClusterIP = "None"
 | 
						|
				newSvc.Spec.ClusterIP = ""
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Service with ClusterIP type cannot change its set ClusterIP",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
 | 
						|
				oldSvc.Spec.ClusterIP = "1.2.3.4"
 | 
						|
				newSvc.Spec.ClusterIP = "1.2.3.5"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Service with ClusterIP type can change its empty ClusterIP",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
 | 
						|
				oldSvc.Spec.ClusterIP = ""
 | 
						|
				newSvc.Spec.ClusterIP = "1.2.3.5"
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Service with ClusterIP type cannot change its set ClusterIP when changing type to NodePort",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeNodePort
 | 
						|
 | 
						|
				oldSvc.Spec.ClusterIP = "1.2.3.4"
 | 
						|
				newSvc.Spec.ClusterIP = "1.2.3.5"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Service with ClusterIP type can change its empty ClusterIP when changing type to NodePort",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeNodePort
 | 
						|
 | 
						|
				oldSvc.Spec.ClusterIP = ""
 | 
						|
				newSvc.Spec.ClusterIP = "1.2.3.5"
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Service with ClusterIP type cannot change its ClusterIP when changing type to LoadBalancer",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
 | 
						|
				oldSvc.Spec.ClusterIP = "1.2.3.4"
 | 
						|
				newSvc.Spec.ClusterIP = "1.2.3.5"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Service with ClusterIP type can change its empty ClusterIP when changing type to LoadBalancer",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
 | 
						|
				oldSvc.Spec.ClusterIP = ""
 | 
						|
				newSvc.Spec.ClusterIP = "1.2.3.5"
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Service with NodePort type cannot change its set ClusterIP",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeNodePort
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeNodePort
 | 
						|
 | 
						|
				oldSvc.Spec.ClusterIP = "1.2.3.4"
 | 
						|
				newSvc.Spec.ClusterIP = "1.2.3.5"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Service with NodePort type can change its empty ClusterIP",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeNodePort
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeNodePort
 | 
						|
 | 
						|
				oldSvc.Spec.ClusterIP = ""
 | 
						|
				newSvc.Spec.ClusterIP = "1.2.3.5"
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Service with NodePort type cannot change its set ClusterIP when changing type to ClusterIP",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeNodePort
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
 | 
						|
				oldSvc.Spec.ClusterIP = "1.2.3.4"
 | 
						|
				newSvc.Spec.ClusterIP = "1.2.3.5"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Service with NodePort type can change its empty ClusterIP when changing type to ClusterIP",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeNodePort
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
 | 
						|
				oldSvc.Spec.ClusterIP = ""
 | 
						|
				newSvc.Spec.ClusterIP = "1.2.3.5"
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Service with NodePort type cannot change its set ClusterIP when changing type to LoadBalancer",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeNodePort
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
 | 
						|
				oldSvc.Spec.ClusterIP = "1.2.3.4"
 | 
						|
				newSvc.Spec.ClusterIP = "1.2.3.5"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Service with NodePort type can change its empty ClusterIP when changing type to LoadBalancer",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeNodePort
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
 | 
						|
				oldSvc.Spec.ClusterIP = ""
 | 
						|
				newSvc.Spec.ClusterIP = "1.2.3.5"
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Service with LoadBalancer type cannot change its set ClusterIP",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
 | 
						|
				oldSvc.Spec.ClusterIP = "1.2.3.4"
 | 
						|
				newSvc.Spec.ClusterIP = "1.2.3.5"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Service with LoadBalancer type can change its empty ClusterIP",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
 | 
						|
				oldSvc.Spec.ClusterIP = ""
 | 
						|
				newSvc.Spec.ClusterIP = "1.2.3.5"
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Service with LoadBalancer type cannot change its set ClusterIP when changing type to ClusterIP",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
 | 
						|
				oldSvc.Spec.ClusterIP = "1.2.3.4"
 | 
						|
				newSvc.Spec.ClusterIP = "1.2.3.5"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Service with LoadBalancer type can change its empty ClusterIP when changing type to ClusterIP",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
 | 
						|
				oldSvc.Spec.ClusterIP = ""
 | 
						|
				newSvc.Spec.ClusterIP = "1.2.3.5"
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Service with LoadBalancer type cannot change its set ClusterIP when changing type to NodePort",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeNodePort
 | 
						|
 | 
						|
				oldSvc.Spec.ClusterIP = "1.2.3.4"
 | 
						|
				newSvc.Spec.ClusterIP = "1.2.3.5"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Service with LoadBalancer type can change its empty ClusterIP when changing type to NodePort",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeLoadBalancer
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeNodePort
 | 
						|
 | 
						|
				oldSvc.Spec.ClusterIP = ""
 | 
						|
				newSvc.Spec.ClusterIP = "1.2.3.5"
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Service with ExternalName type can change its empty ClusterIP when changing type to ClusterIP",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeExternalName
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
 | 
						|
				oldSvc.Spec.ClusterIP = ""
 | 
						|
				newSvc.Spec.ClusterIP = "1.2.3.5"
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Service with ExternalName type can change its set ClusterIP when changing type to ClusterIP",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeExternalName
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeClusterIP
 | 
						|
 | 
						|
				oldSvc.Spec.ClusterIP = "1.2.3.4"
 | 
						|
				newSvc.Spec.ClusterIP = "1.2.3.5"
 | 
						|
			},
 | 
						|
			numErrs: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "invalid node port with clusterIP None",
 | 
						|
			tweakSvc: func(oldSvc, newSvc *core.Service) {
 | 
						|
				oldSvc.Spec.Type = core.ServiceTypeNodePort
 | 
						|
				newSvc.Spec.Type = core.ServiceTypeNodePort
 | 
						|
 | 
						|
				oldSvc.Spec.Ports = append(oldSvc.Spec.Ports, core.ServicePort{Name: "q", Port: 1, Protocol: "TCP", NodePort: 1, TargetPort: intstr.FromInt(1)})
 | 
						|
				newSvc.Spec.Ports = append(newSvc.Spec.Ports, core.ServicePort{Name: "q", Port: 1, Protocol: "TCP", NodePort: 1, TargetPort: intstr.FromInt(1)})
 | 
						|
 | 
						|
				oldSvc.Spec.ClusterIP = ""
 | 
						|
				newSvc.Spec.ClusterIP = "None"
 | 
						|
			},
 | 
						|
			numErrs: 1,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, tc := range testCases {
 | 
						|
		oldSvc := makeValidService()
 | 
						|
		newSvc := makeValidService()
 | 
						|
		tc.tweakSvc(&oldSvc, &newSvc)
 | 
						|
		errs := ValidateServiceUpdate(&newSvc, &oldSvc)
 | 
						|
		if len(errs) != tc.numErrs {
 | 
						|
			t.Errorf("Unexpected error list for case %q: %v", tc.name, errs.ToAggregate())
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateResourceNames(t *testing.T) {
 | 
						|
	table := []struct {
 | 
						|
		input   string
 | 
						|
		success bool
 | 
						|
		expect  string
 | 
						|
	}{
 | 
						|
		{"memory", true, ""},
 | 
						|
		{"cpu", true, ""},
 | 
						|
		{"storage", true, ""},
 | 
						|
		{"requests.cpu", true, ""},
 | 
						|
		{"requests.memory", true, ""},
 | 
						|
		{"requests.storage", true, ""},
 | 
						|
		{"limits.cpu", true, ""},
 | 
						|
		{"limits.memory", true, ""},
 | 
						|
		{"network", false, ""},
 | 
						|
		{"disk", false, ""},
 | 
						|
		{"", false, ""},
 | 
						|
		{".", false, ""},
 | 
						|
		{"..", false, ""},
 | 
						|
		{"my.favorite.app.co/12345", true, ""},
 | 
						|
		{"my.favorite.app.co/_12345", false, ""},
 | 
						|
		{"my.favorite.app.co/12345_", false, ""},
 | 
						|
		{"kubernetes.io/..", false, ""},
 | 
						|
		{"kubernetes.io/" + strings.Repeat("a", 63), true, ""},
 | 
						|
		{"kubernetes.io/" + strings.Repeat("a", 64), false, ""},
 | 
						|
		{"kubernetes.io//", false, ""},
 | 
						|
		{"kubernetes.io", false, ""},
 | 
						|
		{"kubernetes.io/will/not/work/", false, ""},
 | 
						|
	}
 | 
						|
	for k, item := range table {
 | 
						|
		err := validateResourceName(item.input, field.NewPath("field"))
 | 
						|
		if len(err) != 0 && item.success {
 | 
						|
			t.Errorf("expected no failure for input %q", item.input)
 | 
						|
		} else if len(err) == 0 && !item.success {
 | 
						|
			t.Errorf("expected failure for input %q", item.input)
 | 
						|
			for i := range err {
 | 
						|
				detail := err[i].Detail
 | 
						|
				if detail != "" && !strings.Contains(detail, item.expect) {
 | 
						|
					t.Errorf("%d: expected error detail either empty or %s, got %s", k, item.expect, detail)
 | 
						|
				}
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func getResourceList(cpu, memory string) core.ResourceList {
 | 
						|
	res := core.ResourceList{}
 | 
						|
	if cpu != "" {
 | 
						|
		res[core.ResourceCPU] = resource.MustParse(cpu)
 | 
						|
	}
 | 
						|
	if memory != "" {
 | 
						|
		res[core.ResourceMemory] = resource.MustParse(memory)
 | 
						|
	}
 | 
						|
	return res
 | 
						|
}
 | 
						|
 | 
						|
func getStorageResourceList(storage string) core.ResourceList {
 | 
						|
	res := core.ResourceList{}
 | 
						|
	if storage != "" {
 | 
						|
		res[core.ResourceStorage] = resource.MustParse(storage)
 | 
						|
	}
 | 
						|
	return res
 | 
						|
}
 | 
						|
 | 
						|
func getLocalStorageResourceList(ephemeralStorage string) core.ResourceList {
 | 
						|
	res := core.ResourceList{}
 | 
						|
	if ephemeralStorage != "" {
 | 
						|
		res[core.ResourceEphemeralStorage] = resource.MustParse(ephemeralStorage)
 | 
						|
	}
 | 
						|
	return res
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateLimitRangeForLocalStorage(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		name string
 | 
						|
		spec core.LimitRangeSpec
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name: "all-fields-valid",
 | 
						|
			spec: core.LimitRangeSpec{
 | 
						|
				Limits: []core.LimitRangeItem{
 | 
						|
					{
 | 
						|
						Type:                 core.LimitTypePod,
 | 
						|
						Max:                  getLocalStorageResourceList("10000Mi"),
 | 
						|
						Min:                  getLocalStorageResourceList("100Mi"),
 | 
						|
						MaxLimitRequestRatio: getLocalStorageResourceList(""),
 | 
						|
					},
 | 
						|
					{
 | 
						|
						Type:                 core.LimitTypeContainer,
 | 
						|
						Max:                  getLocalStorageResourceList("10000Mi"),
 | 
						|
						Min:                  getLocalStorageResourceList("100Mi"),
 | 
						|
						Default:              getLocalStorageResourceList("500Mi"),
 | 
						|
						DefaultRequest:       getLocalStorageResourceList("200Mi"),
 | 
						|
						MaxLimitRequestRatio: getLocalStorageResourceList(""),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	// Enable alpha feature LocalStorageCapacityIsolation
 | 
						|
	err := utilfeature.DefaultFeatureGate.Set("LocalStorageCapacityIsolation=true")
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("Failed to enable feature gate for LocalStorageCapacityIsolation: %v", err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	for _, testCase := range testCases {
 | 
						|
		limitRange := &core.LimitRange{ObjectMeta: metav1.ObjectMeta{Name: testCase.name, Namespace: "foo"}, Spec: testCase.spec}
 | 
						|
		if errs := ValidateLimitRange(limitRange); len(errs) != 0 {
 | 
						|
			t.Errorf("Case %v, unexpected error: %v", testCase.name, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// Disable alpha feature LocalStorageCapacityIsolation
 | 
						|
	err = utilfeature.DefaultFeatureGate.Set("LocalStorageCapacityIsolation=false")
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("Failed to disable feature gate for LocalStorageCapacityIsolation: %v", err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	for _, testCase := range testCases {
 | 
						|
		limitRange := &core.LimitRange{ObjectMeta: metav1.ObjectMeta{Name: testCase.name, Namespace: "foo"}, Spec: testCase.spec}
 | 
						|
		if errs := ValidateLimitRange(limitRange); len(errs) == 0 {
 | 
						|
			t.Errorf("Case %v, expected feature gate unable error but actually no error", testCase.name)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateLimitRange(t *testing.T) {
 | 
						|
	successCases := []struct {
 | 
						|
		name string
 | 
						|
		spec core.LimitRangeSpec
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name: "all-fields-valid",
 | 
						|
			spec: core.LimitRangeSpec{
 | 
						|
				Limits: []core.LimitRangeItem{
 | 
						|
					{
 | 
						|
						Type:                 core.LimitTypePod,
 | 
						|
						Max:                  getResourceList("100m", "10000Mi"),
 | 
						|
						Min:                  getResourceList("5m", "100Mi"),
 | 
						|
						MaxLimitRequestRatio: getResourceList("10", ""),
 | 
						|
					},
 | 
						|
					{
 | 
						|
						Type:                 core.LimitTypeContainer,
 | 
						|
						Max:                  getResourceList("100m", "10000Mi"),
 | 
						|
						Min:                  getResourceList("5m", "100Mi"),
 | 
						|
						Default:              getResourceList("50m", "500Mi"),
 | 
						|
						DefaultRequest:       getResourceList("10m", "200Mi"),
 | 
						|
						MaxLimitRequestRatio: getResourceList("10", ""),
 | 
						|
					},
 | 
						|
					{
 | 
						|
						Type: core.LimitTypePersistentVolumeClaim,
 | 
						|
						Max:  getStorageResourceList("10Gi"),
 | 
						|
						Min:  getStorageResourceList("5Gi"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "pvc-min-only",
 | 
						|
			spec: core.LimitRangeSpec{
 | 
						|
				Limits: []core.LimitRangeItem{
 | 
						|
					{
 | 
						|
						Type: core.LimitTypePersistentVolumeClaim,
 | 
						|
						Min:  getStorageResourceList("5Gi"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "pvc-max-only",
 | 
						|
			spec: core.LimitRangeSpec{
 | 
						|
				Limits: []core.LimitRangeItem{
 | 
						|
					{
 | 
						|
						Type: core.LimitTypePersistentVolumeClaim,
 | 
						|
						Max:  getStorageResourceList("10Gi"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "all-fields-valid-big-numbers",
 | 
						|
			spec: core.LimitRangeSpec{
 | 
						|
				Limits: []core.LimitRangeItem{
 | 
						|
					{
 | 
						|
						Type:                 core.LimitTypeContainer,
 | 
						|
						Max:                  getResourceList("100m", "10000T"),
 | 
						|
						Min:                  getResourceList("5m", "100Mi"),
 | 
						|
						Default:              getResourceList("50m", "500Mi"),
 | 
						|
						DefaultRequest:       getResourceList("10m", "200Mi"),
 | 
						|
						MaxLimitRequestRatio: getResourceList("10", ""),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "thirdparty-fields-all-valid-standard-container-resources",
 | 
						|
			spec: core.LimitRangeSpec{
 | 
						|
				Limits: []core.LimitRangeItem{
 | 
						|
					{
 | 
						|
						Type:                 "thirdparty.com/foo",
 | 
						|
						Max:                  getResourceList("100m", "10000T"),
 | 
						|
						Min:                  getResourceList("5m", "100Mi"),
 | 
						|
						Default:              getResourceList("50m", "500Mi"),
 | 
						|
						DefaultRequest:       getResourceList("10m", "200Mi"),
 | 
						|
						MaxLimitRequestRatio: getResourceList("10", ""),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "thirdparty-fields-all-valid-storage-resources",
 | 
						|
			spec: core.LimitRangeSpec{
 | 
						|
				Limits: []core.LimitRangeItem{
 | 
						|
					{
 | 
						|
						Type:                 "thirdparty.com/foo",
 | 
						|
						Max:                  getStorageResourceList("10000T"),
 | 
						|
						Min:                  getStorageResourceList("100Mi"),
 | 
						|
						Default:              getStorageResourceList("500Mi"),
 | 
						|
						DefaultRequest:       getStorageResourceList("200Mi"),
 | 
						|
						MaxLimitRequestRatio: getStorageResourceList(""),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, successCase := range successCases {
 | 
						|
		limitRange := &core.LimitRange{ObjectMeta: metav1.ObjectMeta{Name: successCase.name, Namespace: "foo"}, Spec: successCase.spec}
 | 
						|
		if errs := ValidateLimitRange(limitRange); len(errs) != 0 {
 | 
						|
			t.Errorf("Case %v, unexpected error: %v", successCase.name, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	errorCases := map[string]struct {
 | 
						|
		R core.LimitRange
 | 
						|
		D string
 | 
						|
	}{
 | 
						|
		"zero-length-name": {
 | 
						|
			core.LimitRange{ObjectMeta: metav1.ObjectMeta{Name: "", Namespace: "foo"}, Spec: core.LimitRangeSpec{}},
 | 
						|
			"name or generateName is required",
 | 
						|
		},
 | 
						|
		"zero-length-namespace": {
 | 
						|
			core.LimitRange{ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: ""}, Spec: core.LimitRangeSpec{}},
 | 
						|
			"",
 | 
						|
		},
 | 
						|
		"invalid-name": {
 | 
						|
			core.LimitRange{ObjectMeta: metav1.ObjectMeta{Name: "^Invalid", Namespace: "foo"}, Spec: core.LimitRangeSpec{}},
 | 
						|
			dnsSubdomainLabelErrMsg,
 | 
						|
		},
 | 
						|
		"invalid-namespace": {
 | 
						|
			core.LimitRange{ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "^Invalid"}, Spec: core.LimitRangeSpec{}},
 | 
						|
			dnsLabelErrMsg,
 | 
						|
		},
 | 
						|
		"duplicate-limit-type": {
 | 
						|
			core.LimitRange{ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "foo"}, Spec: core.LimitRangeSpec{
 | 
						|
				Limits: []core.LimitRangeItem{
 | 
						|
					{
 | 
						|
						Type: core.LimitTypePod,
 | 
						|
						Max:  getResourceList("100m", "10000m"),
 | 
						|
						Min:  getResourceList("0m", "100m"),
 | 
						|
					},
 | 
						|
					{
 | 
						|
						Type: core.LimitTypePod,
 | 
						|
						Min:  getResourceList("0m", "100m"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			"",
 | 
						|
		},
 | 
						|
		"default-limit-type-pod": {
 | 
						|
			core.LimitRange{ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "foo"}, Spec: core.LimitRangeSpec{
 | 
						|
				Limits: []core.LimitRangeItem{
 | 
						|
					{
 | 
						|
						Type:    core.LimitTypePod,
 | 
						|
						Max:     getResourceList("100m", "10000m"),
 | 
						|
						Min:     getResourceList("0m", "100m"),
 | 
						|
						Default: getResourceList("10m", "100m"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			"may not be specified when `type` is 'Pod'",
 | 
						|
		},
 | 
						|
		"default-request-limit-type-pod": {
 | 
						|
			core.LimitRange{ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "foo"}, Spec: core.LimitRangeSpec{
 | 
						|
				Limits: []core.LimitRangeItem{
 | 
						|
					{
 | 
						|
						Type:           core.LimitTypePod,
 | 
						|
						Max:            getResourceList("100m", "10000m"),
 | 
						|
						Min:            getResourceList("0m", "100m"),
 | 
						|
						DefaultRequest: getResourceList("10m", "100m"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			"may not be specified when `type` is 'Pod'",
 | 
						|
		},
 | 
						|
		"min value 100m is greater than max value 10m": {
 | 
						|
			core.LimitRange{ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "foo"}, Spec: core.LimitRangeSpec{
 | 
						|
				Limits: []core.LimitRangeItem{
 | 
						|
					{
 | 
						|
						Type: core.LimitTypePod,
 | 
						|
						Max:  getResourceList("10m", ""),
 | 
						|
						Min:  getResourceList("100m", ""),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			"min value 100m is greater than max value 10m",
 | 
						|
		},
 | 
						|
		"invalid spec default outside range": {
 | 
						|
			core.LimitRange{ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "foo"}, Spec: core.LimitRangeSpec{
 | 
						|
				Limits: []core.LimitRangeItem{
 | 
						|
					{
 | 
						|
						Type:    core.LimitTypeContainer,
 | 
						|
						Max:     getResourceList("1", ""),
 | 
						|
						Min:     getResourceList("100m", ""),
 | 
						|
						Default: getResourceList("2000m", ""),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			"default value 2 is greater than max value 1",
 | 
						|
		},
 | 
						|
		"invalid spec default request outside range": {
 | 
						|
			core.LimitRange{ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "foo"}, Spec: core.LimitRangeSpec{
 | 
						|
				Limits: []core.LimitRangeItem{
 | 
						|
					{
 | 
						|
						Type:           core.LimitTypeContainer,
 | 
						|
						Max:            getResourceList("1", ""),
 | 
						|
						Min:            getResourceList("100m", ""),
 | 
						|
						DefaultRequest: getResourceList("2000m", ""),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			"default request value 2 is greater than max value 1",
 | 
						|
		},
 | 
						|
		"invalid spec default request more than default": {
 | 
						|
			core.LimitRange{ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "foo"}, Spec: core.LimitRangeSpec{
 | 
						|
				Limits: []core.LimitRangeItem{
 | 
						|
					{
 | 
						|
						Type:           core.LimitTypeContainer,
 | 
						|
						Max:            getResourceList("2", ""),
 | 
						|
						Min:            getResourceList("100m", ""),
 | 
						|
						Default:        getResourceList("500m", ""),
 | 
						|
						DefaultRequest: getResourceList("800m", ""),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			"default request value 800m is greater than default limit value 500m",
 | 
						|
		},
 | 
						|
		"invalid spec maxLimitRequestRatio less than 1": {
 | 
						|
			core.LimitRange{ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "foo"}, Spec: core.LimitRangeSpec{
 | 
						|
				Limits: []core.LimitRangeItem{
 | 
						|
					{
 | 
						|
						Type:                 core.LimitTypePod,
 | 
						|
						MaxLimitRequestRatio: getResourceList("800m", ""),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			"ratio 800m is less than 1",
 | 
						|
		},
 | 
						|
		"invalid spec maxLimitRequestRatio greater than max/min": {
 | 
						|
			core.LimitRange{ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "foo"}, Spec: core.LimitRangeSpec{
 | 
						|
				Limits: []core.LimitRangeItem{
 | 
						|
					{
 | 
						|
						Type:                 core.LimitTypeContainer,
 | 
						|
						Max:                  getResourceList("", "2Gi"),
 | 
						|
						Min:                  getResourceList("", "512Mi"),
 | 
						|
						MaxLimitRequestRatio: getResourceList("", "10"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			"ratio 10 is greater than max/min = 4.000000",
 | 
						|
		},
 | 
						|
		"invalid non standard limit type": {
 | 
						|
			core.LimitRange{ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "foo"}, Spec: core.LimitRangeSpec{
 | 
						|
				Limits: []core.LimitRangeItem{
 | 
						|
					{
 | 
						|
						Type:                 "foo",
 | 
						|
						Max:                  getStorageResourceList("10000T"),
 | 
						|
						Min:                  getStorageResourceList("100Mi"),
 | 
						|
						Default:              getStorageResourceList("500Mi"),
 | 
						|
						DefaultRequest:       getStorageResourceList("200Mi"),
 | 
						|
						MaxLimitRequestRatio: getStorageResourceList(""),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			"must be a standard limit type or fully qualified",
 | 
						|
		},
 | 
						|
		"min and max values missing, one required": {
 | 
						|
			core.LimitRange{ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "foo"}, Spec: core.LimitRangeSpec{
 | 
						|
				Limits: []core.LimitRangeItem{
 | 
						|
					{
 | 
						|
						Type: core.LimitTypePersistentVolumeClaim,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			"either minimum or maximum storage value is required, but neither was provided",
 | 
						|
		},
 | 
						|
		"invalid min greater than max": {
 | 
						|
			core.LimitRange{ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "foo"}, Spec: core.LimitRangeSpec{
 | 
						|
				Limits: []core.LimitRangeItem{
 | 
						|
					{
 | 
						|
						Type: core.LimitTypePersistentVolumeClaim,
 | 
						|
						Min:  getStorageResourceList("10Gi"),
 | 
						|
						Max:  getStorageResourceList("1Gi"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			}},
 | 
						|
			"min value 10Gi is greater than max value 1Gi",
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for k, v := range errorCases {
 | 
						|
		errs := ValidateLimitRange(&v.R)
 | 
						|
		if len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure for %s", k)
 | 
						|
		}
 | 
						|
		for i := range errs {
 | 
						|
			detail := errs[i].Detail
 | 
						|
			if !strings.Contains(detail, v.D) {
 | 
						|
				t.Errorf("[%s]: expected error detail either empty or %q, got %q", k, v.D, detail)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
}
 | 
						|
 | 
						|
func TestValidatePersistentVolumeClaimStatusUpdate(t *testing.T) {
 | 
						|
	validClaim := testVolumeClaim("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
		AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
			core.ReadWriteOnce,
 | 
						|
			core.ReadOnlyMany,
 | 
						|
		},
 | 
						|
		Resources: core.ResourceRequirements{
 | 
						|
			Requests: core.ResourceList{
 | 
						|
				core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
			},
 | 
						|
		},
 | 
						|
	})
 | 
						|
	validConditionUpdate := testVolumeClaimWithStatus("foo", "ns", core.PersistentVolumeClaimSpec{
 | 
						|
		AccessModes: []core.PersistentVolumeAccessMode{
 | 
						|
			core.ReadWriteOnce,
 | 
						|
			core.ReadOnlyMany,
 | 
						|
		},
 | 
						|
		Resources: core.ResourceRequirements{
 | 
						|
			Requests: core.ResourceList{
 | 
						|
				core.ResourceName(core.ResourceStorage): resource.MustParse("10G"),
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}, core.PersistentVolumeClaimStatus{
 | 
						|
		Phase: core.ClaimPending,
 | 
						|
		Conditions: []core.PersistentVolumeClaimCondition{
 | 
						|
			{Type: core.PersistentVolumeClaimResizing, Status: core.ConditionTrue},
 | 
						|
		},
 | 
						|
	})
 | 
						|
	scenarios := map[string]struct {
 | 
						|
		isExpectedFailure bool
 | 
						|
		oldClaim          *core.PersistentVolumeClaim
 | 
						|
		newClaim          *core.PersistentVolumeClaim
 | 
						|
		enableResize      bool
 | 
						|
	}{
 | 
						|
		"condition-update-with-disabled-feature-gate": {
 | 
						|
			isExpectedFailure: true,
 | 
						|
			oldClaim:          validClaim,
 | 
						|
			newClaim:          validConditionUpdate,
 | 
						|
			enableResize:      false,
 | 
						|
		},
 | 
						|
		"condition-update-with-enabled-feature-gate": {
 | 
						|
			isExpectedFailure: false,
 | 
						|
			oldClaim:          validClaim,
 | 
						|
			newClaim:          validConditionUpdate,
 | 
						|
			enableResize:      true,
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for name, scenario := range scenarios {
 | 
						|
		// ensure we have a resource version specified for updates
 | 
						|
		togglePVExpandFeature(scenario.enableResize, t)
 | 
						|
		scenario.oldClaim.ResourceVersion = "1"
 | 
						|
		scenario.newClaim.ResourceVersion = "1"
 | 
						|
		errs := ValidatePersistentVolumeClaimStatusUpdate(scenario.newClaim, scenario.oldClaim)
 | 
						|
		if len(errs) == 0 && scenario.isExpectedFailure {
 | 
						|
			t.Errorf("Unexpected success for scenario: %s", name)
 | 
						|
		}
 | 
						|
		if len(errs) > 0 && !scenario.isExpectedFailure {
 | 
						|
			t.Errorf("Unexpected failure for scenario: %s - %+v", name, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateResourceQuota(t *testing.T) {
 | 
						|
	spec := core.ResourceQuotaSpec{
 | 
						|
		Hard: core.ResourceList{
 | 
						|
			core.ResourceCPU:                    resource.MustParse("100"),
 | 
						|
			core.ResourceMemory:                 resource.MustParse("10000"),
 | 
						|
			core.ResourceRequestsCPU:            resource.MustParse("100"),
 | 
						|
			core.ResourceRequestsMemory:         resource.MustParse("10000"),
 | 
						|
			core.ResourceLimitsCPU:              resource.MustParse("100"),
 | 
						|
			core.ResourceLimitsMemory:           resource.MustParse("10000"),
 | 
						|
			core.ResourcePods:                   resource.MustParse("10"),
 | 
						|
			core.ResourceServices:               resource.MustParse("0"),
 | 
						|
			core.ResourceReplicationControllers: resource.MustParse("10"),
 | 
						|
			core.ResourceQuotas:                 resource.MustParse("10"),
 | 
						|
			core.ResourceConfigMaps:             resource.MustParse("10"),
 | 
						|
			core.ResourceSecrets:                resource.MustParse("10"),
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	terminatingSpec := core.ResourceQuotaSpec{
 | 
						|
		Hard: core.ResourceList{
 | 
						|
			core.ResourceCPU:       resource.MustParse("100"),
 | 
						|
			core.ResourceLimitsCPU: resource.MustParse("200"),
 | 
						|
		},
 | 
						|
		Scopes: []core.ResourceQuotaScope{core.ResourceQuotaScopeTerminating},
 | 
						|
	}
 | 
						|
 | 
						|
	nonTerminatingSpec := core.ResourceQuotaSpec{
 | 
						|
		Hard: core.ResourceList{
 | 
						|
			core.ResourceCPU: resource.MustParse("100"),
 | 
						|
		},
 | 
						|
		Scopes: []core.ResourceQuotaScope{core.ResourceQuotaScopeNotTerminating},
 | 
						|
	}
 | 
						|
 | 
						|
	bestEffortSpec := core.ResourceQuotaSpec{
 | 
						|
		Hard: core.ResourceList{
 | 
						|
			core.ResourcePods: resource.MustParse("100"),
 | 
						|
		},
 | 
						|
		Scopes: []core.ResourceQuotaScope{core.ResourceQuotaScopeBestEffort},
 | 
						|
	}
 | 
						|
 | 
						|
	nonBestEffortSpec := core.ResourceQuotaSpec{
 | 
						|
		Hard: core.ResourceList{
 | 
						|
			core.ResourceCPU: resource.MustParse("100"),
 | 
						|
		},
 | 
						|
		Scopes: []core.ResourceQuotaScope{core.ResourceQuotaScopeNotBestEffort},
 | 
						|
	}
 | 
						|
 | 
						|
	// storage is not yet supported as a quota tracked resource
 | 
						|
	invalidQuotaResourceSpec := core.ResourceQuotaSpec{
 | 
						|
		Hard: core.ResourceList{
 | 
						|
			core.ResourceStorage: resource.MustParse("10"),
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	negativeSpec := core.ResourceQuotaSpec{
 | 
						|
		Hard: core.ResourceList{
 | 
						|
			core.ResourceCPU:                    resource.MustParse("-100"),
 | 
						|
			core.ResourceMemory:                 resource.MustParse("-10000"),
 | 
						|
			core.ResourcePods:                   resource.MustParse("-10"),
 | 
						|
			core.ResourceServices:               resource.MustParse("-10"),
 | 
						|
			core.ResourceReplicationControllers: resource.MustParse("-10"),
 | 
						|
			core.ResourceQuotas:                 resource.MustParse("-10"),
 | 
						|
			core.ResourceConfigMaps:             resource.MustParse("-10"),
 | 
						|
			core.ResourceSecrets:                resource.MustParse("-10"),
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	fractionalComputeSpec := core.ResourceQuotaSpec{
 | 
						|
		Hard: core.ResourceList{
 | 
						|
			core.ResourceCPU: resource.MustParse("100m"),
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	fractionalPodSpec := core.ResourceQuotaSpec{
 | 
						|
		Hard: core.ResourceList{
 | 
						|
			core.ResourcePods:                   resource.MustParse(".1"),
 | 
						|
			core.ResourceServices:               resource.MustParse(".5"),
 | 
						|
			core.ResourceReplicationControllers: resource.MustParse("1.25"),
 | 
						|
			core.ResourceQuotas:                 resource.MustParse("2.5"),
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	invalidTerminatingScopePairsSpec := core.ResourceQuotaSpec{
 | 
						|
		Hard: core.ResourceList{
 | 
						|
			core.ResourceCPU: resource.MustParse("100"),
 | 
						|
		},
 | 
						|
		Scopes: []core.ResourceQuotaScope{core.ResourceQuotaScopeTerminating, core.ResourceQuotaScopeNotTerminating},
 | 
						|
	}
 | 
						|
 | 
						|
	invalidBestEffortScopePairsSpec := core.ResourceQuotaSpec{
 | 
						|
		Hard: core.ResourceList{
 | 
						|
			core.ResourcePods: resource.MustParse("100"),
 | 
						|
		},
 | 
						|
		Scopes: []core.ResourceQuotaScope{core.ResourceQuotaScopeBestEffort, core.ResourceQuotaScopeNotBestEffort},
 | 
						|
	}
 | 
						|
 | 
						|
	invalidScopeNameSpec := core.ResourceQuotaSpec{
 | 
						|
		Hard: core.ResourceList{
 | 
						|
			core.ResourceCPU: resource.MustParse("100"),
 | 
						|
		},
 | 
						|
		Scopes: []core.ResourceQuotaScope{core.ResourceQuotaScope("foo")},
 | 
						|
	}
 | 
						|
 | 
						|
	successCases := []core.ResourceQuota{
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "abc",
 | 
						|
				Namespace: "foo",
 | 
						|
			},
 | 
						|
			Spec: spec,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "abc",
 | 
						|
				Namespace: "foo",
 | 
						|
			},
 | 
						|
			Spec: fractionalComputeSpec,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "abc",
 | 
						|
				Namespace: "foo",
 | 
						|
			},
 | 
						|
			Spec: terminatingSpec,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "abc",
 | 
						|
				Namespace: "foo",
 | 
						|
			},
 | 
						|
			Spec: nonTerminatingSpec,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "abc",
 | 
						|
				Namespace: "foo",
 | 
						|
			},
 | 
						|
			Spec: bestEffortSpec,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "abc",
 | 
						|
				Namespace: "foo",
 | 
						|
			},
 | 
						|
			Spec: nonBestEffortSpec,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, successCase := range successCases {
 | 
						|
		if errs := ValidateResourceQuota(&successCase); len(errs) != 0 {
 | 
						|
			t.Errorf("expected success: %v", errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	errorCases := map[string]struct {
 | 
						|
		R core.ResourceQuota
 | 
						|
		D string
 | 
						|
	}{
 | 
						|
		"zero-length Name": {
 | 
						|
			core.ResourceQuota{ObjectMeta: metav1.ObjectMeta{Name: "", Namespace: "foo"}, Spec: spec},
 | 
						|
			"name or generateName is required",
 | 
						|
		},
 | 
						|
		"zero-length Namespace": {
 | 
						|
			core.ResourceQuota{ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: ""}, Spec: spec},
 | 
						|
			"",
 | 
						|
		},
 | 
						|
		"invalid Name": {
 | 
						|
			core.ResourceQuota{ObjectMeta: metav1.ObjectMeta{Name: "^Invalid", Namespace: "foo"}, Spec: spec},
 | 
						|
			dnsSubdomainLabelErrMsg,
 | 
						|
		},
 | 
						|
		"invalid Namespace": {
 | 
						|
			core.ResourceQuota{ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "^Invalid"}, Spec: spec},
 | 
						|
			dnsLabelErrMsg,
 | 
						|
		},
 | 
						|
		"negative-limits": {
 | 
						|
			core.ResourceQuota{ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "foo"}, Spec: negativeSpec},
 | 
						|
			isNegativeErrorMsg,
 | 
						|
		},
 | 
						|
		"fractional-api-resource": {
 | 
						|
			core.ResourceQuota{ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "foo"}, Spec: fractionalPodSpec},
 | 
						|
			isNotIntegerErrorMsg,
 | 
						|
		},
 | 
						|
		"invalid-quota-resource": {
 | 
						|
			core.ResourceQuota{ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "foo"}, Spec: invalidQuotaResourceSpec},
 | 
						|
			isInvalidQuotaResource,
 | 
						|
		},
 | 
						|
		"invalid-quota-terminating-pair": {
 | 
						|
			core.ResourceQuota{ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "foo"}, Spec: invalidTerminatingScopePairsSpec},
 | 
						|
			"conflicting scopes",
 | 
						|
		},
 | 
						|
		"invalid-quota-besteffort-pair": {
 | 
						|
			core.ResourceQuota{ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "foo"}, Spec: invalidBestEffortScopePairsSpec},
 | 
						|
			"conflicting scopes",
 | 
						|
		},
 | 
						|
		"invalid-quota-scope-name": {
 | 
						|
			core.ResourceQuota{ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: "foo"}, Spec: invalidScopeNameSpec},
 | 
						|
			"unsupported scope",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for k, v := range errorCases {
 | 
						|
		errs := ValidateResourceQuota(&v.R)
 | 
						|
		if len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure for %s", k)
 | 
						|
		}
 | 
						|
		for i := range errs {
 | 
						|
			if !strings.Contains(errs[i].Detail, v.D) {
 | 
						|
				t.Errorf("[%s]: expected error detail either empty or %s, got %s", k, v.D, errs[i].Detail)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateNamespace(t *testing.T) {
 | 
						|
	validLabels := map[string]string{"a": "b"}
 | 
						|
	invalidLabels := map[string]string{"NoUppercaseOrSpecialCharsLike=Equals": "b"}
 | 
						|
	successCases := []core.Namespace{
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "abc", Labels: validLabels},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "abc-123"},
 | 
						|
			Spec: core.NamespaceSpec{
 | 
						|
				Finalizers: []core.FinalizerName{"example.com/something", "example.com/other"},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for _, successCase := range successCases {
 | 
						|
		if errs := ValidateNamespace(&successCase); len(errs) != 0 {
 | 
						|
			t.Errorf("expected success: %v", errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	errorCases := map[string]struct {
 | 
						|
		R core.Namespace
 | 
						|
		D string
 | 
						|
	}{
 | 
						|
		"zero-length name": {
 | 
						|
			core.Namespace{ObjectMeta: metav1.ObjectMeta{Name: ""}},
 | 
						|
			"",
 | 
						|
		},
 | 
						|
		"defined-namespace": {
 | 
						|
			core.Namespace{ObjectMeta: metav1.ObjectMeta{Name: "abc-123", Namespace: "makesnosense"}},
 | 
						|
			"",
 | 
						|
		},
 | 
						|
		"invalid-labels": {
 | 
						|
			core.Namespace{ObjectMeta: metav1.ObjectMeta{Name: "abc", Labels: invalidLabels}},
 | 
						|
			"",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for k, v := range errorCases {
 | 
						|
		errs := ValidateNamespace(&v.R)
 | 
						|
		if len(errs) == 0 {
 | 
						|
			t.Errorf("expected failure for %s", k)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateNamespaceFinalizeUpdate(t *testing.T) {
 | 
						|
	tests := []struct {
 | 
						|
		oldNamespace core.Namespace
 | 
						|
		namespace    core.Namespace
 | 
						|
		valid        bool
 | 
						|
	}{
 | 
						|
		{core.Namespace{}, core.Namespace{}, true},
 | 
						|
		{core.Namespace{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo"}},
 | 
						|
			core.Namespace{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo"},
 | 
						|
				Spec: core.NamespaceSpec{
 | 
						|
					Finalizers: []core.FinalizerName{"Foo"},
 | 
						|
				},
 | 
						|
			}, false},
 | 
						|
		{core.Namespace{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo"},
 | 
						|
			Spec: core.NamespaceSpec{
 | 
						|
				Finalizers: []core.FinalizerName{"foo.com/bar"},
 | 
						|
			},
 | 
						|
		},
 | 
						|
			core.Namespace{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo"},
 | 
						|
				Spec: core.NamespaceSpec{
 | 
						|
					Finalizers: []core.FinalizerName{"foo.com/bar", "what.com/bar"},
 | 
						|
				},
 | 
						|
			}, true},
 | 
						|
		{core.Namespace{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "fooemptyfinalizer"},
 | 
						|
			Spec: core.NamespaceSpec{
 | 
						|
				Finalizers: []core.FinalizerName{"foo.com/bar"},
 | 
						|
			},
 | 
						|
		},
 | 
						|
			core.Namespace{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "fooemptyfinalizer"},
 | 
						|
				Spec: core.NamespaceSpec{
 | 
						|
					Finalizers: []core.FinalizerName{"", "foo.com/bar", "what.com/bar"},
 | 
						|
				},
 | 
						|
			}, false},
 | 
						|
	}
 | 
						|
	for i, test := range tests {
 | 
						|
		test.namespace.ObjectMeta.ResourceVersion = "1"
 | 
						|
		test.oldNamespace.ObjectMeta.ResourceVersion = "1"
 | 
						|
		errs := ValidateNamespaceFinalizeUpdate(&test.namespace, &test.oldNamespace)
 | 
						|
		if test.valid && len(errs) > 0 {
 | 
						|
			t.Errorf("%d: Unexpected error: %v", i, errs)
 | 
						|
			t.Logf("%#v vs %#v", test.oldNamespace, test.namespace)
 | 
						|
		}
 | 
						|
		if !test.valid && len(errs) == 0 {
 | 
						|
			t.Errorf("%d: Unexpected non-error", i)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateNamespaceStatusUpdate(t *testing.T) {
 | 
						|
	now := metav1.Now()
 | 
						|
 | 
						|
	tests := []struct {
 | 
						|
		oldNamespace core.Namespace
 | 
						|
		namespace    core.Namespace
 | 
						|
		valid        bool
 | 
						|
	}{
 | 
						|
		{core.Namespace{}, core.Namespace{
 | 
						|
			Status: core.NamespaceStatus{
 | 
						|
				Phase: core.NamespaceActive,
 | 
						|
			},
 | 
						|
		}, true},
 | 
						|
		// Cannot set deletionTimestamp via status update
 | 
						|
		{core.Namespace{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo"}},
 | 
						|
			core.Namespace{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:              "foo",
 | 
						|
					DeletionTimestamp: &now},
 | 
						|
				Status: core.NamespaceStatus{
 | 
						|
					Phase: core.NamespaceTerminating,
 | 
						|
				},
 | 
						|
			}, false},
 | 
						|
		// Can update phase via status update
 | 
						|
		{core.Namespace{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:              "foo",
 | 
						|
				DeletionTimestamp: &now}},
 | 
						|
			core.Namespace{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:              "foo",
 | 
						|
					DeletionTimestamp: &now},
 | 
						|
				Status: core.NamespaceStatus{
 | 
						|
					Phase: core.NamespaceTerminating,
 | 
						|
				},
 | 
						|
			}, true},
 | 
						|
		{core.Namespace{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo"}},
 | 
						|
			core.Namespace{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "foo"},
 | 
						|
				Status: core.NamespaceStatus{
 | 
						|
					Phase: core.NamespaceTerminating,
 | 
						|
				},
 | 
						|
			}, false},
 | 
						|
		{core.Namespace{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo"}},
 | 
						|
			core.Namespace{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "bar"},
 | 
						|
				Status: core.NamespaceStatus{
 | 
						|
					Phase: core.NamespaceTerminating,
 | 
						|
				},
 | 
						|
			}, false},
 | 
						|
	}
 | 
						|
	for i, test := range tests {
 | 
						|
		test.namespace.ObjectMeta.ResourceVersion = "1"
 | 
						|
		test.oldNamespace.ObjectMeta.ResourceVersion = "1"
 | 
						|
		errs := ValidateNamespaceStatusUpdate(&test.namespace, &test.oldNamespace)
 | 
						|
		if test.valid && len(errs) > 0 {
 | 
						|
			t.Errorf("%d: Unexpected error: %v", i, errs)
 | 
						|
			t.Logf("%#v vs %#v", test.oldNamespace.ObjectMeta, test.namespace.ObjectMeta)
 | 
						|
		}
 | 
						|
		if !test.valid && len(errs) == 0 {
 | 
						|
			t.Errorf("%d: Unexpected non-error", i)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateNamespaceUpdate(t *testing.T) {
 | 
						|
	tests := []struct {
 | 
						|
		oldNamespace core.Namespace
 | 
						|
		namespace    core.Namespace
 | 
						|
		valid        bool
 | 
						|
	}{
 | 
						|
		{core.Namespace{}, core.Namespace{}, true},
 | 
						|
		{core.Namespace{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo1"}},
 | 
						|
			core.Namespace{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name: "bar1"},
 | 
						|
			}, false},
 | 
						|
		{core.Namespace{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "foo2",
 | 
						|
				Labels: map[string]string{"foo": "bar"},
 | 
						|
			},
 | 
						|
		}, core.Namespace{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "foo2",
 | 
						|
				Labels: map[string]string{"foo": "baz"},
 | 
						|
			},
 | 
						|
		}, true},
 | 
						|
		{core.Namespace{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name: "foo3",
 | 
						|
			},
 | 
						|
		}, core.Namespace{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "foo3",
 | 
						|
				Labels: map[string]string{"foo": "baz"},
 | 
						|
			},
 | 
						|
		}, true},
 | 
						|
		{core.Namespace{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "foo4",
 | 
						|
				Labels: map[string]string{"bar": "foo"},
 | 
						|
			},
 | 
						|
		}, core.Namespace{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "foo4",
 | 
						|
				Labels: map[string]string{"foo": "baz"},
 | 
						|
			},
 | 
						|
		}, true},
 | 
						|
		{core.Namespace{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "foo5",
 | 
						|
				Labels: map[string]string{"foo": "baz"},
 | 
						|
			},
 | 
						|
		}, core.Namespace{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "foo5",
 | 
						|
				Labels: map[string]string{"Foo": "baz"},
 | 
						|
			},
 | 
						|
		}, true},
 | 
						|
		{core.Namespace{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "foo6",
 | 
						|
				Labels: map[string]string{"foo": "baz"},
 | 
						|
			},
 | 
						|
		}, core.Namespace{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:   "foo6",
 | 
						|
				Labels: map[string]string{"Foo": "baz"},
 | 
						|
			},
 | 
						|
			Spec: core.NamespaceSpec{
 | 
						|
				Finalizers: []core.FinalizerName{"kubernetes"},
 | 
						|
			},
 | 
						|
			Status: core.NamespaceStatus{
 | 
						|
				Phase: core.NamespaceTerminating,
 | 
						|
			},
 | 
						|
		}, true},
 | 
						|
	}
 | 
						|
	for i, test := range tests {
 | 
						|
		test.namespace.ObjectMeta.ResourceVersion = "1"
 | 
						|
		test.oldNamespace.ObjectMeta.ResourceVersion = "1"
 | 
						|
		errs := ValidateNamespaceUpdate(&test.namespace, &test.oldNamespace)
 | 
						|
		if test.valid && len(errs) > 0 {
 | 
						|
			t.Errorf("%d: Unexpected error: %v", i, errs)
 | 
						|
			t.Logf("%#v vs %#v", test.oldNamespace.ObjectMeta, test.namespace.ObjectMeta)
 | 
						|
		}
 | 
						|
		if !test.valid && len(errs) == 0 {
 | 
						|
			t.Errorf("%d: Unexpected non-error", i)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateSecret(t *testing.T) {
 | 
						|
	// Opaque secret validation
 | 
						|
	validSecret := func() core.Secret {
 | 
						|
		return core.Secret{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "bar"},
 | 
						|
			Data: map[string][]byte{
 | 
						|
				"data-1": []byte("bar"),
 | 
						|
			},
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	var (
 | 
						|
		emptyName     = validSecret()
 | 
						|
		invalidName   = validSecret()
 | 
						|
		emptyNs       = validSecret()
 | 
						|
		invalidNs     = validSecret()
 | 
						|
		overMaxSize   = validSecret()
 | 
						|
		invalidKey    = validSecret()
 | 
						|
		leadingDotKey = validSecret()
 | 
						|
		dotKey        = validSecret()
 | 
						|
		doubleDotKey  = validSecret()
 | 
						|
	)
 | 
						|
 | 
						|
	emptyName.Name = ""
 | 
						|
	invalidName.Name = "NoUppercaseOrSpecialCharsLike=Equals"
 | 
						|
	emptyNs.Namespace = ""
 | 
						|
	invalidNs.Namespace = "NoUppercaseOrSpecialCharsLike=Equals"
 | 
						|
	overMaxSize.Data = map[string][]byte{
 | 
						|
		"over": make([]byte, core.MaxSecretSize+1),
 | 
						|
	}
 | 
						|
	invalidKey.Data["a*b"] = []byte("whoops")
 | 
						|
	leadingDotKey.Data[".key"] = []byte("bar")
 | 
						|
	dotKey.Data["."] = []byte("bar")
 | 
						|
	doubleDotKey.Data[".."] = []byte("bar")
 | 
						|
 | 
						|
	// kubernetes.io/service-account-token secret validation
 | 
						|
	validServiceAccountTokenSecret := func() core.Secret {
 | 
						|
		return core.Secret{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "foo",
 | 
						|
				Namespace: "bar",
 | 
						|
				Annotations: map[string]string{
 | 
						|
					core.ServiceAccountNameKey: "foo",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Type: core.SecretTypeServiceAccountToken,
 | 
						|
			Data: map[string][]byte{
 | 
						|
				"data-1": []byte("bar"),
 | 
						|
			},
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	var (
 | 
						|
		emptyTokenAnnotation    = validServiceAccountTokenSecret()
 | 
						|
		missingTokenAnnotation  = validServiceAccountTokenSecret()
 | 
						|
		missingTokenAnnotations = validServiceAccountTokenSecret()
 | 
						|
	)
 | 
						|
	emptyTokenAnnotation.Annotations[core.ServiceAccountNameKey] = ""
 | 
						|
	delete(missingTokenAnnotation.Annotations, core.ServiceAccountNameKey)
 | 
						|
	missingTokenAnnotations.Annotations = nil
 | 
						|
 | 
						|
	tests := map[string]struct {
 | 
						|
		secret core.Secret
 | 
						|
		valid  bool
 | 
						|
	}{
 | 
						|
		"valid":                                     {validSecret(), true},
 | 
						|
		"empty name":                                {emptyName, false},
 | 
						|
		"invalid name":                              {invalidName, false},
 | 
						|
		"empty namespace":                           {emptyNs, false},
 | 
						|
		"invalid namespace":                         {invalidNs, false},
 | 
						|
		"over max size":                             {overMaxSize, false},
 | 
						|
		"invalid key":                               {invalidKey, false},
 | 
						|
		"valid service-account-token secret":        {validServiceAccountTokenSecret(), true},
 | 
						|
		"empty service-account-token annotation":    {emptyTokenAnnotation, false},
 | 
						|
		"missing service-account-token annotation":  {missingTokenAnnotation, false},
 | 
						|
		"missing service-account-token annotations": {missingTokenAnnotations, false},
 | 
						|
		"leading dot key":                           {leadingDotKey, true},
 | 
						|
		"dot key":                                   {dotKey, false},
 | 
						|
		"double dot key":                            {doubleDotKey, false},
 | 
						|
	}
 | 
						|
 | 
						|
	for name, tc := range tests {
 | 
						|
		errs := ValidateSecret(&tc.secret)
 | 
						|
		if tc.valid && len(errs) > 0 {
 | 
						|
			t.Errorf("%v: Unexpected error: %v", name, errs)
 | 
						|
		}
 | 
						|
		if !tc.valid && len(errs) == 0 {
 | 
						|
			t.Errorf("%v: Unexpected non-error", name)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateDockerConfigSecret(t *testing.T) {
 | 
						|
	validDockerSecret := func() core.Secret {
 | 
						|
		return core.Secret{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "bar"},
 | 
						|
			Type:       core.SecretTypeDockercfg,
 | 
						|
			Data: map[string][]byte{
 | 
						|
				core.DockerConfigKey: []byte(`{"https://index.docker.io/v1/": {"auth": "Y2x1ZWRyb29sZXIwMDAxOnBhc3N3b3Jk","email": "fake@example.com"}}`),
 | 
						|
			},
 | 
						|
		}
 | 
						|
	}
 | 
						|
	validDockerSecret2 := func() core.Secret {
 | 
						|
		return core.Secret{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "bar"},
 | 
						|
			Type:       core.SecretTypeDockerConfigJson,
 | 
						|
			Data: map[string][]byte{
 | 
						|
				core.DockerConfigJsonKey: []byte(`{"auths":{"https://index.docker.io/v1/": {"auth": "Y2x1ZWRyb29sZXIwMDAxOnBhc3N3b3Jk","email": "fake@example.com"}}}`),
 | 
						|
			},
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	var (
 | 
						|
		missingDockerConfigKey  = validDockerSecret()
 | 
						|
		emptyDockerConfigKey    = validDockerSecret()
 | 
						|
		invalidDockerConfigKey  = validDockerSecret()
 | 
						|
		missingDockerConfigKey2 = validDockerSecret2()
 | 
						|
		emptyDockerConfigKey2   = validDockerSecret2()
 | 
						|
		invalidDockerConfigKey2 = validDockerSecret2()
 | 
						|
	)
 | 
						|
 | 
						|
	delete(missingDockerConfigKey.Data, core.DockerConfigKey)
 | 
						|
	emptyDockerConfigKey.Data[core.DockerConfigKey] = []byte("")
 | 
						|
	invalidDockerConfigKey.Data[core.DockerConfigKey] = []byte("bad")
 | 
						|
	delete(missingDockerConfigKey2.Data, core.DockerConfigJsonKey)
 | 
						|
	emptyDockerConfigKey2.Data[core.DockerConfigJsonKey] = []byte("")
 | 
						|
	invalidDockerConfigKey2.Data[core.DockerConfigJsonKey] = []byte("bad")
 | 
						|
 | 
						|
	tests := map[string]struct {
 | 
						|
		secret core.Secret
 | 
						|
		valid  bool
 | 
						|
	}{
 | 
						|
		"valid dockercfg":     {validDockerSecret(), true},
 | 
						|
		"missing dockercfg":   {missingDockerConfigKey, false},
 | 
						|
		"empty dockercfg":     {emptyDockerConfigKey, false},
 | 
						|
		"invalid dockercfg":   {invalidDockerConfigKey, false},
 | 
						|
		"valid config.json":   {validDockerSecret2(), true},
 | 
						|
		"missing config.json": {missingDockerConfigKey2, false},
 | 
						|
		"empty config.json":   {emptyDockerConfigKey2, false},
 | 
						|
		"invalid config.json": {invalidDockerConfigKey2, false},
 | 
						|
	}
 | 
						|
 | 
						|
	for name, tc := range tests {
 | 
						|
		errs := ValidateSecret(&tc.secret)
 | 
						|
		if tc.valid && len(errs) > 0 {
 | 
						|
			t.Errorf("%v: Unexpected error: %v", name, errs)
 | 
						|
		}
 | 
						|
		if !tc.valid && len(errs) == 0 {
 | 
						|
			t.Errorf("%v: Unexpected non-error", name)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateBasicAuthSecret(t *testing.T) {
 | 
						|
	validBasicAuthSecret := func() core.Secret {
 | 
						|
		return core.Secret{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "bar"},
 | 
						|
			Type:       core.SecretTypeBasicAuth,
 | 
						|
			Data: map[string][]byte{
 | 
						|
				core.BasicAuthUsernameKey: []byte("username"),
 | 
						|
				core.BasicAuthPasswordKey: []byte("password"),
 | 
						|
			},
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	var (
 | 
						|
		missingBasicAuthUsernamePasswordKeys = validBasicAuthSecret()
 | 
						|
	)
 | 
						|
 | 
						|
	delete(missingBasicAuthUsernamePasswordKeys.Data, core.BasicAuthUsernameKey)
 | 
						|
	delete(missingBasicAuthUsernamePasswordKeys.Data, core.BasicAuthPasswordKey)
 | 
						|
 | 
						|
	tests := map[string]struct {
 | 
						|
		secret core.Secret
 | 
						|
		valid  bool
 | 
						|
	}{
 | 
						|
		"valid": {validBasicAuthSecret(), true},
 | 
						|
		"missing username and password": {missingBasicAuthUsernamePasswordKeys, false},
 | 
						|
	}
 | 
						|
 | 
						|
	for name, tc := range tests {
 | 
						|
		errs := ValidateSecret(&tc.secret)
 | 
						|
		if tc.valid && len(errs) > 0 {
 | 
						|
			t.Errorf("%v: Unexpected error: %v", name, errs)
 | 
						|
		}
 | 
						|
		if !tc.valid && len(errs) == 0 {
 | 
						|
			t.Errorf("%v: Unexpected non-error", name)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateSSHAuthSecret(t *testing.T) {
 | 
						|
	validSSHAuthSecret := func() core.Secret {
 | 
						|
		return core.Secret{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "bar"},
 | 
						|
			Type:       core.SecretTypeSSHAuth,
 | 
						|
			Data: map[string][]byte{
 | 
						|
				core.SSHAuthPrivateKey: []byte("foo-bar-baz"),
 | 
						|
			},
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	missingSSHAuthPrivateKey := validSSHAuthSecret()
 | 
						|
 | 
						|
	delete(missingSSHAuthPrivateKey.Data, core.SSHAuthPrivateKey)
 | 
						|
 | 
						|
	tests := map[string]struct {
 | 
						|
		secret core.Secret
 | 
						|
		valid  bool
 | 
						|
	}{
 | 
						|
		"valid":               {validSSHAuthSecret(), true},
 | 
						|
		"missing private key": {missingSSHAuthPrivateKey, false},
 | 
						|
	}
 | 
						|
 | 
						|
	for name, tc := range tests {
 | 
						|
		errs := ValidateSecret(&tc.secret)
 | 
						|
		if tc.valid && len(errs) > 0 {
 | 
						|
			t.Errorf("%v: Unexpected error: %v", name, errs)
 | 
						|
		}
 | 
						|
		if !tc.valid && len(errs) == 0 {
 | 
						|
			t.Errorf("%v: Unexpected non-error", name)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateEndpoints(t *testing.T) {
 | 
						|
	successCases := map[string]core.Endpoints{
 | 
						|
		"simple endpoint": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "mysvc", Namespace: "namespace"},
 | 
						|
			Subsets: []core.EndpointSubset{
 | 
						|
				{
 | 
						|
					Addresses: []core.EndpointAddress{{IP: "10.10.1.1"}, {IP: "10.10.2.2"}},
 | 
						|
					Ports:     []core.EndpointPort{{Name: "a", Port: 8675, Protocol: "TCP"}, {Name: "b", Port: 309, Protocol: "TCP"}},
 | 
						|
				},
 | 
						|
				{
 | 
						|
					Addresses: []core.EndpointAddress{{IP: "10.10.3.3"}},
 | 
						|
					Ports:     []core.EndpointPort{{Name: "a", Port: 93, Protocol: "TCP"}, {Name: "b", Port: 76, Protocol: "TCP"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"empty subsets": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "mysvc", Namespace: "namespace"},
 | 
						|
		},
 | 
						|
		"no name required for singleton port": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "mysvc", Namespace: "namespace"},
 | 
						|
			Subsets: []core.EndpointSubset{
 | 
						|
				{
 | 
						|
					Addresses: []core.EndpointAddress{{IP: "10.10.1.1"}},
 | 
						|
					Ports:     []core.EndpointPort{{Port: 8675, Protocol: "TCP"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"empty ports": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "mysvc", Namespace: "namespace"},
 | 
						|
			Subsets: []core.EndpointSubset{
 | 
						|
				{
 | 
						|
					Addresses: []core.EndpointAddress{{IP: "10.10.3.3"}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for k, v := range successCases {
 | 
						|
		if errs := ValidateEndpoints(&v); len(errs) != 0 {
 | 
						|
			t.Errorf("Expected success for %s, got %v", k, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	errorCases := map[string]struct {
 | 
						|
		endpoints   core.Endpoints
 | 
						|
		errorType   field.ErrorType
 | 
						|
		errorDetail string
 | 
						|
	}{
 | 
						|
		"missing namespace": {
 | 
						|
			endpoints: core.Endpoints{ObjectMeta: metav1.ObjectMeta{Name: "mysvc"}},
 | 
						|
			errorType: "FieldValueRequired",
 | 
						|
		},
 | 
						|
		"missing name": {
 | 
						|
			endpoints: core.Endpoints{ObjectMeta: metav1.ObjectMeta{Namespace: "namespace"}},
 | 
						|
			errorType: "FieldValueRequired",
 | 
						|
		},
 | 
						|
		"invalid namespace": {
 | 
						|
			endpoints:   core.Endpoints{ObjectMeta: metav1.ObjectMeta{Name: "mysvc", Namespace: "no@#invalid.;chars\"allowed"}},
 | 
						|
			errorType:   "FieldValueInvalid",
 | 
						|
			errorDetail: dnsLabelErrMsg,
 | 
						|
		},
 | 
						|
		"invalid name": {
 | 
						|
			endpoints:   core.Endpoints{ObjectMeta: metav1.ObjectMeta{Name: "-_Invliad^&Characters", Namespace: "namespace"}},
 | 
						|
			errorType:   "FieldValueInvalid",
 | 
						|
			errorDetail: dnsSubdomainLabelErrMsg,
 | 
						|
		},
 | 
						|
		"empty addresses": {
 | 
						|
			endpoints: core.Endpoints{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "mysvc", Namespace: "namespace"},
 | 
						|
				Subsets: []core.EndpointSubset{
 | 
						|
					{
 | 
						|
						Ports: []core.EndpointPort{{Name: "a", Port: 93, Protocol: "TCP"}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errorType: "FieldValueRequired",
 | 
						|
		},
 | 
						|
		"invalid IP": {
 | 
						|
			endpoints: core.Endpoints{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "mysvc", Namespace: "namespace"},
 | 
						|
				Subsets: []core.EndpointSubset{
 | 
						|
					{
 | 
						|
						Addresses: []core.EndpointAddress{{IP: "[2001:0db8:85a3:0042:1000:8a2e:0370:7334]"}},
 | 
						|
						Ports:     []core.EndpointPort{{Name: "a", Port: 93, Protocol: "TCP"}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errorType:   "FieldValueInvalid",
 | 
						|
			errorDetail: "must be a valid IP address",
 | 
						|
		},
 | 
						|
		"Multiple ports, one without name": {
 | 
						|
			endpoints: core.Endpoints{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "mysvc", Namespace: "namespace"},
 | 
						|
				Subsets: []core.EndpointSubset{
 | 
						|
					{
 | 
						|
						Addresses: []core.EndpointAddress{{IP: "10.10.1.1"}},
 | 
						|
						Ports:     []core.EndpointPort{{Port: 8675, Protocol: "TCP"}, {Name: "b", Port: 309, Protocol: "TCP"}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errorType: "FieldValueRequired",
 | 
						|
		},
 | 
						|
		"Invalid port number": {
 | 
						|
			endpoints: core.Endpoints{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "mysvc", Namespace: "namespace"},
 | 
						|
				Subsets: []core.EndpointSubset{
 | 
						|
					{
 | 
						|
						Addresses: []core.EndpointAddress{{IP: "10.10.1.1"}},
 | 
						|
						Ports:     []core.EndpointPort{{Name: "a", Port: 66000, Protocol: "TCP"}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errorType:   "FieldValueInvalid",
 | 
						|
			errorDetail: "between",
 | 
						|
		},
 | 
						|
		"Invalid protocol": {
 | 
						|
			endpoints: core.Endpoints{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "mysvc", Namespace: "namespace"},
 | 
						|
				Subsets: []core.EndpointSubset{
 | 
						|
					{
 | 
						|
						Addresses: []core.EndpointAddress{{IP: "10.10.1.1"}},
 | 
						|
						Ports:     []core.EndpointPort{{Name: "a", Port: 93, Protocol: "Protocol"}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errorType: "FieldValueNotSupported",
 | 
						|
		},
 | 
						|
		"Address missing IP": {
 | 
						|
			endpoints: core.Endpoints{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "mysvc", Namespace: "namespace"},
 | 
						|
				Subsets: []core.EndpointSubset{
 | 
						|
					{
 | 
						|
						Addresses: []core.EndpointAddress{{}},
 | 
						|
						Ports:     []core.EndpointPort{{Name: "a", Port: 93, Protocol: "TCP"}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errorType:   "FieldValueInvalid",
 | 
						|
			errorDetail: "must be a valid IP address",
 | 
						|
		},
 | 
						|
		"Port missing number": {
 | 
						|
			endpoints: core.Endpoints{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "mysvc", Namespace: "namespace"},
 | 
						|
				Subsets: []core.EndpointSubset{
 | 
						|
					{
 | 
						|
						Addresses: []core.EndpointAddress{{IP: "10.10.1.1"}},
 | 
						|
						Ports:     []core.EndpointPort{{Name: "a", Protocol: "TCP"}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errorType:   "FieldValueInvalid",
 | 
						|
			errorDetail: "between",
 | 
						|
		},
 | 
						|
		"Port missing protocol": {
 | 
						|
			endpoints: core.Endpoints{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "mysvc", Namespace: "namespace"},
 | 
						|
				Subsets: []core.EndpointSubset{
 | 
						|
					{
 | 
						|
						Addresses: []core.EndpointAddress{{IP: "10.10.1.1"}},
 | 
						|
						Ports:     []core.EndpointPort{{Name: "a", Port: 93}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errorType: "FieldValueRequired",
 | 
						|
		},
 | 
						|
		"Address is loopback": {
 | 
						|
			endpoints: core.Endpoints{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "mysvc", Namespace: "namespace"},
 | 
						|
				Subsets: []core.EndpointSubset{
 | 
						|
					{
 | 
						|
						Addresses: []core.EndpointAddress{{IP: "127.0.0.1"}},
 | 
						|
						Ports:     []core.EndpointPort{{Name: "p", Port: 93, Protocol: "TCP"}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errorType:   "FieldValueInvalid",
 | 
						|
			errorDetail: "loopback",
 | 
						|
		},
 | 
						|
		"Address is link-local": {
 | 
						|
			endpoints: core.Endpoints{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "mysvc", Namespace: "namespace"},
 | 
						|
				Subsets: []core.EndpointSubset{
 | 
						|
					{
 | 
						|
						Addresses: []core.EndpointAddress{{IP: "169.254.169.254"}},
 | 
						|
						Ports:     []core.EndpointPort{{Name: "p", Port: 93, Protocol: "TCP"}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errorType:   "FieldValueInvalid",
 | 
						|
			errorDetail: "link-local",
 | 
						|
		},
 | 
						|
		"Address is link-local multicast": {
 | 
						|
			endpoints: core.Endpoints{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "mysvc", Namespace: "namespace"},
 | 
						|
				Subsets: []core.EndpointSubset{
 | 
						|
					{
 | 
						|
						Addresses: []core.EndpointAddress{{IP: "224.0.0.1"}},
 | 
						|
						Ports:     []core.EndpointPort{{Name: "p", Port: 93, Protocol: "TCP"}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errorType:   "FieldValueInvalid",
 | 
						|
			errorDetail: "link-local multicast",
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for k, v := range errorCases {
 | 
						|
		if errs := ValidateEndpoints(&v.endpoints); len(errs) == 0 || errs[0].Type != v.errorType || !strings.Contains(errs[0].Detail, v.errorDetail) {
 | 
						|
			t.Errorf("[%s] Expected error type %s with detail %q, got %v", k, v.errorType, v.errorDetail, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateTLSSecret(t *testing.T) {
 | 
						|
	successCases := map[string]core.Secret{
 | 
						|
		"empty certificate chain": {
 | 
						|
			ObjectMeta: metav1.ObjectMeta{Name: "tls-cert", Namespace: "namespace"},
 | 
						|
			Data: map[string][]byte{
 | 
						|
				core.TLSCertKey:       []byte("public key"),
 | 
						|
				core.TLSPrivateKeyKey: []byte("private key"),
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for k, v := range successCases {
 | 
						|
		if errs := ValidateSecret(&v); len(errs) != 0 {
 | 
						|
			t.Errorf("Expected success for %s, got %v", k, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	errorCases := map[string]struct {
 | 
						|
		secrets     core.Secret
 | 
						|
		errorType   field.ErrorType
 | 
						|
		errorDetail string
 | 
						|
	}{
 | 
						|
		"missing public key": {
 | 
						|
			secrets: core.Secret{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "tls-cert"},
 | 
						|
				Data: map[string][]byte{
 | 
						|
					core.TLSCertKey: []byte("public key"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errorType: "FieldValueRequired",
 | 
						|
		},
 | 
						|
		"missing private key": {
 | 
						|
			secrets: core.Secret{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Name: "tls-cert"},
 | 
						|
				Data: map[string][]byte{
 | 
						|
					core.TLSCertKey: []byte("public key"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
			errorType: "FieldValueRequired",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for k, v := range errorCases {
 | 
						|
		if errs := ValidateSecret(&v.secrets); len(errs) == 0 || errs[0].Type != v.errorType || !strings.Contains(errs[0].Detail, v.errorDetail) {
 | 
						|
			t.Errorf("[%s] Expected error type %s with detail %q, got %v", k, v.errorType, v.errorDetail, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateSecurityContext(t *testing.T) {
 | 
						|
	runAsUser := int64(1)
 | 
						|
	fullValidSC := func() *core.SecurityContext {
 | 
						|
		return &core.SecurityContext{
 | 
						|
			Privileged: boolPtr(false),
 | 
						|
			Capabilities: &core.Capabilities{
 | 
						|
				Add:  []core.Capability{"foo"},
 | 
						|
				Drop: []core.Capability{"bar"},
 | 
						|
			},
 | 
						|
			SELinuxOptions: &core.SELinuxOptions{
 | 
						|
				User:  "user",
 | 
						|
				Role:  "role",
 | 
						|
				Type:  "type",
 | 
						|
				Level: "level",
 | 
						|
			},
 | 
						|
			RunAsUser: &runAsUser,
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	//setup data
 | 
						|
	allSettings := fullValidSC()
 | 
						|
	noCaps := fullValidSC()
 | 
						|
	noCaps.Capabilities = nil
 | 
						|
 | 
						|
	noSELinux := fullValidSC()
 | 
						|
	noSELinux.SELinuxOptions = nil
 | 
						|
 | 
						|
	noPrivRequest := fullValidSC()
 | 
						|
	noPrivRequest.Privileged = nil
 | 
						|
 | 
						|
	noRunAsUser := fullValidSC()
 | 
						|
	noRunAsUser.RunAsUser = nil
 | 
						|
 | 
						|
	successCases := map[string]struct {
 | 
						|
		sc *core.SecurityContext
 | 
						|
	}{
 | 
						|
		"all settings":    {allSettings},
 | 
						|
		"no capabilities": {noCaps},
 | 
						|
		"no selinux":      {noSELinux},
 | 
						|
		"no priv request": {noPrivRequest},
 | 
						|
		"no run as user":  {noRunAsUser},
 | 
						|
	}
 | 
						|
	for k, v := range successCases {
 | 
						|
		if errs := ValidateSecurityContext(v.sc, field.NewPath("field")); len(errs) != 0 {
 | 
						|
			t.Errorf("[%s] Expected success, got %v", k, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	privRequestWithGlobalDeny := fullValidSC()
 | 
						|
	privRequestWithGlobalDeny.Privileged = boolPtr(true)
 | 
						|
 | 
						|
	negativeRunAsUser := fullValidSC()
 | 
						|
	negativeUser := int64(-1)
 | 
						|
	negativeRunAsUser.RunAsUser = &negativeUser
 | 
						|
 | 
						|
	privWithoutEscalation := fullValidSC()
 | 
						|
	privWithoutEscalation.Privileged = boolPtr(true)
 | 
						|
	privWithoutEscalation.AllowPrivilegeEscalation = boolPtr(false)
 | 
						|
 | 
						|
	capSysAdminWithoutEscalation := fullValidSC()
 | 
						|
	capSysAdminWithoutEscalation.Capabilities.Add = []core.Capability{"CAP_SYS_ADMIN"}
 | 
						|
	capSysAdminWithoutEscalation.AllowPrivilegeEscalation = boolPtr(false)
 | 
						|
 | 
						|
	errorCases := map[string]struct {
 | 
						|
		sc           *core.SecurityContext
 | 
						|
		errorType    field.ErrorType
 | 
						|
		errorDetail  string
 | 
						|
		capAllowPriv bool
 | 
						|
	}{
 | 
						|
		"request privileged when capabilities forbids": {
 | 
						|
			sc:          privRequestWithGlobalDeny,
 | 
						|
			errorType:   "FieldValueForbidden",
 | 
						|
			errorDetail: "disallowed by cluster policy",
 | 
						|
		},
 | 
						|
		"negative RunAsUser": {
 | 
						|
			sc:          negativeRunAsUser,
 | 
						|
			errorType:   "FieldValueInvalid",
 | 
						|
			errorDetail: "must be between",
 | 
						|
		},
 | 
						|
		"with CAP_SYS_ADMIN and allowPrivilegeEscalation false": {
 | 
						|
			sc:          capSysAdminWithoutEscalation,
 | 
						|
			errorType:   "FieldValueInvalid",
 | 
						|
			errorDetail: "cannot set `allowPrivilegeEscalation` to false and `capabilities.Add` CAP_SYS_ADMIN",
 | 
						|
		},
 | 
						|
		"with privileged and allowPrivilegeEscalation false": {
 | 
						|
			sc:           privWithoutEscalation,
 | 
						|
			errorType:    "FieldValueInvalid",
 | 
						|
			errorDetail:  "cannot set `allowPrivilegeEscalation` to false and `privileged` to true",
 | 
						|
			capAllowPriv: true,
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for k, v := range errorCases {
 | 
						|
		capabilities.SetForTests(capabilities.Capabilities{
 | 
						|
			AllowPrivileged: v.capAllowPriv,
 | 
						|
		})
 | 
						|
		if errs := ValidateSecurityContext(v.sc, field.NewPath("field")); len(errs) == 0 || errs[0].Type != v.errorType || !strings.Contains(errs[0].Detail, v.errorDetail) {
 | 
						|
			t.Errorf("[%s] Expected error type %q with detail %q, got %v", k, v.errorType, v.errorDetail, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func fakeValidSecurityContext(priv bool) *core.SecurityContext {
 | 
						|
	return &core.SecurityContext{
 | 
						|
		Privileged: &priv,
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidPodLogOptions(t *testing.T) {
 | 
						|
	now := metav1.Now()
 | 
						|
	negative := int64(-1)
 | 
						|
	zero := int64(0)
 | 
						|
	positive := int64(1)
 | 
						|
	tests := []struct {
 | 
						|
		opt  core.PodLogOptions
 | 
						|
		errs int
 | 
						|
	}{
 | 
						|
		{core.PodLogOptions{}, 0},
 | 
						|
		{core.PodLogOptions{Previous: true}, 0},
 | 
						|
		{core.PodLogOptions{Follow: true}, 0},
 | 
						|
		{core.PodLogOptions{TailLines: &zero}, 0},
 | 
						|
		{core.PodLogOptions{TailLines: &negative}, 1},
 | 
						|
		{core.PodLogOptions{TailLines: &positive}, 0},
 | 
						|
		{core.PodLogOptions{LimitBytes: &zero}, 1},
 | 
						|
		{core.PodLogOptions{LimitBytes: &negative}, 1},
 | 
						|
		{core.PodLogOptions{LimitBytes: &positive}, 0},
 | 
						|
		{core.PodLogOptions{SinceSeconds: &negative}, 1},
 | 
						|
		{core.PodLogOptions{SinceSeconds: &positive}, 0},
 | 
						|
		{core.PodLogOptions{SinceSeconds: &zero}, 1},
 | 
						|
		{core.PodLogOptions{SinceTime: &now}, 0},
 | 
						|
	}
 | 
						|
	for i, test := range tests {
 | 
						|
		errs := ValidatePodLogOptions(&test.opt)
 | 
						|
		if test.errs != len(errs) {
 | 
						|
			t.Errorf("%d: Unexpected errors: %v", i, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateConfigMap(t *testing.T) {
 | 
						|
	newConfigMap := func(name, namespace string, data map[string]string, binaryData map[string][]byte) core.ConfigMap {
 | 
						|
		return core.ConfigMap{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      name,
 | 
						|
				Namespace: namespace,
 | 
						|
			},
 | 
						|
			Data:       data,
 | 
						|
			BinaryData: binaryData,
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	var (
 | 
						|
		validConfigMap = newConfigMap("validname", "validns", map[string]string{"key": "value"}, map[string][]byte{"bin": []byte("value")})
 | 
						|
		maxKeyLength   = newConfigMap("validname", "validns", map[string]string{strings.Repeat("a", 253): "value"}, nil)
 | 
						|
 | 
						|
		emptyName               = newConfigMap("", "validns", nil, nil)
 | 
						|
		invalidName             = newConfigMap("NoUppercaseOrSpecialCharsLike=Equals", "validns", nil, nil)
 | 
						|
		emptyNs                 = newConfigMap("validname", "", nil, nil)
 | 
						|
		invalidNs               = newConfigMap("validname", "NoUppercaseOrSpecialCharsLike=Equals", nil, nil)
 | 
						|
		invalidKey              = newConfigMap("validname", "validns", map[string]string{"a*b": "value"}, nil)
 | 
						|
		leadingDotKey           = newConfigMap("validname", "validns", map[string]string{".ab": "value"}, nil)
 | 
						|
		dotKey                  = newConfigMap("validname", "validns", map[string]string{".": "value"}, nil)
 | 
						|
		doubleDotKey            = newConfigMap("validname", "validns", map[string]string{"..": "value"}, nil)
 | 
						|
		overMaxKeyLength        = newConfigMap("validname", "validns", map[string]string{strings.Repeat("a", 254): "value"}, nil)
 | 
						|
		overMaxSize             = newConfigMap("validname", "validns", map[string]string{"key": strings.Repeat("a", v1.MaxSecretSize+1)}, nil)
 | 
						|
		duplicatedKey           = newConfigMap("validname", "validns", map[string]string{"key": "value1"}, map[string][]byte{"key": []byte("value2")})
 | 
						|
		binDataInvalidKey       = newConfigMap("validname", "validns", nil, map[string][]byte{"a*b": []byte("value")})
 | 
						|
		binDataLeadingDotKey    = newConfigMap("validname", "validns", nil, map[string][]byte{".ab": []byte("value")})
 | 
						|
		binDataDotKey           = newConfigMap("validname", "validns", nil, map[string][]byte{".": []byte("value")})
 | 
						|
		binDataDoubleDotKey     = newConfigMap("validname", "validns", nil, map[string][]byte{"..": []byte("value")})
 | 
						|
		binDataOverMaxKeyLength = newConfigMap("validname", "validns", nil, map[string][]byte{strings.Repeat("a", 254): []byte("value")})
 | 
						|
		binDataOverMaxSize      = newConfigMap("validname", "validns", nil, map[string][]byte{"bin": bytes.Repeat([]byte("a"), v1.MaxSecretSize+1)})
 | 
						|
		binNonUtf8Value         = newConfigMap("validname", "validns", nil, map[string][]byte{"key": {0, 0xFE, 0, 0xFF}})
 | 
						|
	)
 | 
						|
 | 
						|
	tests := map[string]struct {
 | 
						|
		cfg     core.ConfigMap
 | 
						|
		isValid bool
 | 
						|
	}{
 | 
						|
		"valid":                           {validConfigMap, true},
 | 
						|
		"max key length":                  {maxKeyLength, true},
 | 
						|
		"leading dot key":                 {leadingDotKey, true},
 | 
						|
		"empty name":                      {emptyName, false},
 | 
						|
		"invalid name":                    {invalidName, false},
 | 
						|
		"invalid key":                     {invalidKey, false},
 | 
						|
		"empty namespace":                 {emptyNs, false},
 | 
						|
		"invalid namespace":               {invalidNs, false},
 | 
						|
		"dot key":                         {dotKey, false},
 | 
						|
		"double dot key":                  {doubleDotKey, false},
 | 
						|
		"over max key length":             {overMaxKeyLength, false},
 | 
						|
		"over max size":                   {overMaxSize, false},
 | 
						|
		"duplicated key":                  {duplicatedKey, false},
 | 
						|
		"binary data invalid key":         {binDataInvalidKey, false},
 | 
						|
		"binary data leading dot key":     {binDataLeadingDotKey, true},
 | 
						|
		"binary data dot key":             {binDataDotKey, false},
 | 
						|
		"binary data double dot key":      {binDataDoubleDotKey, false},
 | 
						|
		"binary data over max key length": {binDataOverMaxKeyLength, false},
 | 
						|
		"binary data max size":            {binDataOverMaxSize, false},
 | 
						|
		"binary data non utf-8 bytes":     {binNonUtf8Value, true},
 | 
						|
	}
 | 
						|
 | 
						|
	for name, tc := range tests {
 | 
						|
		errs := ValidateConfigMap(&tc.cfg)
 | 
						|
		if tc.isValid && len(errs) > 0 {
 | 
						|
			t.Errorf("%v: unexpected error: %v", name, errs)
 | 
						|
		}
 | 
						|
		if !tc.isValid && len(errs) == 0 {
 | 
						|
			t.Errorf("%v: unexpected non-error", name)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateConfigMapUpdate(t *testing.T) {
 | 
						|
	newConfigMap := func(version, name, namespace string, data map[string]string) core.ConfigMap {
 | 
						|
		return core.ConfigMap{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:            name,
 | 
						|
				Namespace:       namespace,
 | 
						|
				ResourceVersion: version,
 | 
						|
			},
 | 
						|
			Data: data,
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	var (
 | 
						|
		validConfigMap = newConfigMap("1", "validname", "validns", map[string]string{"key": "value"})
 | 
						|
		noVersion      = newConfigMap("", "validname", "validns", map[string]string{"key": "value"})
 | 
						|
	)
 | 
						|
 | 
						|
	cases := []struct {
 | 
						|
		name    string
 | 
						|
		newCfg  core.ConfigMap
 | 
						|
		oldCfg  core.ConfigMap
 | 
						|
		isValid bool
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name:    "valid",
 | 
						|
			newCfg:  validConfigMap,
 | 
						|
			oldCfg:  validConfigMap,
 | 
						|
			isValid: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:    "invalid",
 | 
						|
			newCfg:  noVersion,
 | 
						|
			oldCfg:  validConfigMap,
 | 
						|
			isValid: false,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, tc := range cases {
 | 
						|
		errs := ValidateConfigMapUpdate(&tc.newCfg, &tc.oldCfg)
 | 
						|
		if tc.isValid && len(errs) > 0 {
 | 
						|
			t.Errorf("%v: unexpected error: %v", tc.name, errs)
 | 
						|
		}
 | 
						|
		if !tc.isValid && len(errs) == 0 {
 | 
						|
			t.Errorf("%v: unexpected non-error", tc.name)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateHasLabel(t *testing.T) {
 | 
						|
	successCase := metav1.ObjectMeta{
 | 
						|
		Name:      "123",
 | 
						|
		Namespace: "ns",
 | 
						|
		Labels: map[string]string{
 | 
						|
			"other": "blah",
 | 
						|
			"foo":   "bar",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	if errs := ValidateHasLabel(successCase, field.NewPath("field"), "foo", "bar"); len(errs) != 0 {
 | 
						|
		t.Errorf("expected success: %v", errs)
 | 
						|
	}
 | 
						|
 | 
						|
	missingCase := metav1.ObjectMeta{
 | 
						|
		Name:      "123",
 | 
						|
		Namespace: "ns",
 | 
						|
		Labels: map[string]string{
 | 
						|
			"other": "blah",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	if errs := ValidateHasLabel(missingCase, field.NewPath("field"), "foo", "bar"); len(errs) == 0 {
 | 
						|
		t.Errorf("expected failure")
 | 
						|
	}
 | 
						|
 | 
						|
	wrongValueCase := metav1.ObjectMeta{
 | 
						|
		Name:      "123",
 | 
						|
		Namespace: "ns",
 | 
						|
		Labels: map[string]string{
 | 
						|
			"other": "blah",
 | 
						|
			"foo":   "notbar",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	if errs := ValidateHasLabel(wrongValueCase, field.NewPath("field"), "foo", "bar"); len(errs) == 0 {
 | 
						|
		t.Errorf("expected failure")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestIsValidSysctlName(t *testing.T) {
 | 
						|
	valid := []string{
 | 
						|
		"a.b.c.d",
 | 
						|
		"a",
 | 
						|
		"a_b",
 | 
						|
		"a-b",
 | 
						|
		"abc",
 | 
						|
		"abc.def",
 | 
						|
	}
 | 
						|
	invalid := []string{
 | 
						|
		"",
 | 
						|
		"*",
 | 
						|
		"ä",
 | 
						|
		"a_",
 | 
						|
		"_",
 | 
						|
		"__",
 | 
						|
		"_a",
 | 
						|
		"_a._b",
 | 
						|
		"-",
 | 
						|
		".",
 | 
						|
		"a.",
 | 
						|
		".a",
 | 
						|
		"a.b.",
 | 
						|
		"a*.b",
 | 
						|
		"a*b",
 | 
						|
		"*a",
 | 
						|
		"a.*",
 | 
						|
		"*",
 | 
						|
		"abc*",
 | 
						|
		"a.abc*",
 | 
						|
		"a.b.*",
 | 
						|
		"Abc",
 | 
						|
		func(n int) string {
 | 
						|
			x := make([]byte, n)
 | 
						|
			for i := range x {
 | 
						|
				x[i] = byte('a')
 | 
						|
			}
 | 
						|
			return string(x)
 | 
						|
		}(256),
 | 
						|
	}
 | 
						|
	for _, s := range valid {
 | 
						|
		if !IsValidSysctlName(s) {
 | 
						|
			t.Errorf("%q expected to be a valid sysctl name", s)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	for _, s := range invalid {
 | 
						|
		if IsValidSysctlName(s) {
 | 
						|
			t.Errorf("%q expected to be an invalid sysctl name", s)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateSysctls(t *testing.T) {
 | 
						|
	valid := []string{
 | 
						|
		"net.foo.bar",
 | 
						|
		"kernel.shmmax",
 | 
						|
	}
 | 
						|
	invalid := []string{
 | 
						|
		"i..nvalid",
 | 
						|
		"_invalid",
 | 
						|
	}
 | 
						|
 | 
						|
	sysctls := make([]core.Sysctl, len(valid))
 | 
						|
	for i, sysctl := range valid {
 | 
						|
		sysctls[i].Name = sysctl
 | 
						|
	}
 | 
						|
	errs := validateSysctls(sysctls, field.NewPath("foo"))
 | 
						|
	if len(errs) != 0 {
 | 
						|
		t.Errorf("unexpected validation errors: %v", errs)
 | 
						|
	}
 | 
						|
 | 
						|
	sysctls = make([]core.Sysctl, len(invalid))
 | 
						|
	for i, sysctl := range invalid {
 | 
						|
		sysctls[i].Name = sysctl
 | 
						|
	}
 | 
						|
	errs = validateSysctls(sysctls, field.NewPath("foo"))
 | 
						|
	if len(errs) != 2 {
 | 
						|
		t.Errorf("expected 2 validation errors. Got: %v", errs)
 | 
						|
	} else {
 | 
						|
		if got, expected := errs[0].Error(), "foo"; !strings.Contains(got, expected) {
 | 
						|
			t.Errorf("unexpected errors: expected=%q, got=%q", expected, got)
 | 
						|
		}
 | 
						|
		if got, expected := errs[1].Error(), "foo"; !strings.Contains(got, expected) {
 | 
						|
			t.Errorf("unexpected errors: expected=%q, got=%q", expected, got)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func newNodeNameEndpoint(nodeName string) *core.Endpoints {
 | 
						|
	ep := &core.Endpoints{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name:            "foo",
 | 
						|
			Namespace:       metav1.NamespaceDefault,
 | 
						|
			ResourceVersion: "1",
 | 
						|
		},
 | 
						|
		Subsets: []core.EndpointSubset{
 | 
						|
			{
 | 
						|
				NotReadyAddresses: []core.EndpointAddress{},
 | 
						|
				Ports:             []core.EndpointPort{{Name: "https", Port: 443, Protocol: "TCP"}},
 | 
						|
				Addresses: []core.EndpointAddress{
 | 
						|
					{
 | 
						|
						IP:       "8.8.8.8",
 | 
						|
						Hostname: "zookeeper1",
 | 
						|
						NodeName: &nodeName}}}}}
 | 
						|
	return ep
 | 
						|
}
 | 
						|
 | 
						|
func TestEndpointAddressNodeNameUpdateRestrictions(t *testing.T) {
 | 
						|
	oldEndpoint := newNodeNameEndpoint("kubernetes-node-setup-by-backend")
 | 
						|
	updatedEndpoint := newNodeNameEndpoint("kubernetes-changed-nodename")
 | 
						|
	// Check that NodeName cannot be changed during update (if already set)
 | 
						|
	errList := ValidateEndpoints(updatedEndpoint)
 | 
						|
	errList = append(errList, ValidateEndpointsUpdate(updatedEndpoint, oldEndpoint)...)
 | 
						|
	if len(errList) == 0 {
 | 
						|
		t.Error("Endpoint should not allow changing of Subset.Addresses.NodeName on update")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestEndpointAddressNodeNameInvalidDNSSubdomain(t *testing.T) {
 | 
						|
	// Check NodeName DNS validation
 | 
						|
	endpoint := newNodeNameEndpoint("illegal*.nodename")
 | 
						|
	errList := ValidateEndpoints(endpoint)
 | 
						|
	if len(errList) == 0 {
 | 
						|
		t.Error("Endpoint should reject invalid NodeName")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestEndpointAddressNodeNameCanBeAnIPAddress(t *testing.T) {
 | 
						|
	endpoint := newNodeNameEndpoint("10.10.1.1")
 | 
						|
	errList := ValidateEndpoints(endpoint)
 | 
						|
	if len(errList) != 0 {
 | 
						|
		t.Error("Endpoint should accept a NodeName that is an IP address")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateFlexVolumeSource(t *testing.T) {
 | 
						|
	testcases := map[string]struct {
 | 
						|
		source       *core.FlexVolumeSource
 | 
						|
		expectedErrs map[string]string
 | 
						|
	}{
 | 
						|
		"valid": {
 | 
						|
			source:       &core.FlexVolumeSource{Driver: "foo"},
 | 
						|
			expectedErrs: map[string]string{},
 | 
						|
		},
 | 
						|
		"valid with options": {
 | 
						|
			source:       &core.FlexVolumeSource{Driver: "foo", Options: map[string]string{"foo": "bar"}},
 | 
						|
			expectedErrs: map[string]string{},
 | 
						|
		},
 | 
						|
		"no driver": {
 | 
						|
			source:       &core.FlexVolumeSource{Driver: ""},
 | 
						|
			expectedErrs: map[string]string{"driver": "Required value"},
 | 
						|
		},
 | 
						|
		"reserved option keys": {
 | 
						|
			source: &core.FlexVolumeSource{
 | 
						|
				Driver: "foo",
 | 
						|
				Options: map[string]string{
 | 
						|
					// valid options
 | 
						|
					"myns.io":               "A",
 | 
						|
					"myns.io/bar":           "A",
 | 
						|
					"myns.io/kubernetes.io": "A",
 | 
						|
 | 
						|
					// invalid options
 | 
						|
					"KUBERNETES.IO":     "A",
 | 
						|
					"kubernetes.io":     "A",
 | 
						|
					"kubernetes.io/":    "A",
 | 
						|
					"kubernetes.io/foo": "A",
 | 
						|
 | 
						|
					"alpha.kubernetes.io":     "A",
 | 
						|
					"alpha.kubernetes.io/":    "A",
 | 
						|
					"alpha.kubernetes.io/foo": "A",
 | 
						|
 | 
						|
					"k8s.io":     "A",
 | 
						|
					"k8s.io/":    "A",
 | 
						|
					"k8s.io/foo": "A",
 | 
						|
 | 
						|
					"alpha.k8s.io":     "A",
 | 
						|
					"alpha.k8s.io/":    "A",
 | 
						|
					"alpha.k8s.io/foo": "A",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedErrs: map[string]string{
 | 
						|
				"options[KUBERNETES.IO]":           "reserved",
 | 
						|
				"options[kubernetes.io]":           "reserved",
 | 
						|
				"options[kubernetes.io/]":          "reserved",
 | 
						|
				"options[kubernetes.io/foo]":       "reserved",
 | 
						|
				"options[alpha.kubernetes.io]":     "reserved",
 | 
						|
				"options[alpha.kubernetes.io/]":    "reserved",
 | 
						|
				"options[alpha.kubernetes.io/foo]": "reserved",
 | 
						|
				"options[k8s.io]":                  "reserved",
 | 
						|
				"options[k8s.io/]":                 "reserved",
 | 
						|
				"options[k8s.io/foo]":              "reserved",
 | 
						|
				"options[alpha.k8s.io]":            "reserved",
 | 
						|
				"options[alpha.k8s.io/]":           "reserved",
 | 
						|
				"options[alpha.k8s.io/foo]":        "reserved",
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for k, tc := range testcases {
 | 
						|
		errs := validateFlexVolumeSource(tc.source, nil)
 | 
						|
		for _, err := range errs {
 | 
						|
			expectedErr, ok := tc.expectedErrs[err.Field]
 | 
						|
			if !ok {
 | 
						|
				t.Errorf("%s: unexpected err on field %s: %v", k, err.Field, err)
 | 
						|
				continue
 | 
						|
			}
 | 
						|
			if !strings.Contains(err.Error(), expectedErr) {
 | 
						|
				t.Errorf("%s: expected err on field %s to contain '%s', was %v", k, err.Field, expectedErr, err.Error())
 | 
						|
				continue
 | 
						|
			}
 | 
						|
		}
 | 
						|
		if len(errs) != len(tc.expectedErrs) {
 | 
						|
			t.Errorf("%s: expected errs %#v, got %#v", k, tc.expectedErrs, errs)
 | 
						|
			continue
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateOrSetClientIPAffinityConfig(t *testing.T) {
 | 
						|
	successCases := map[string]*core.SessionAffinityConfig{
 | 
						|
		"non-empty config, valid timeout: 1": {
 | 
						|
			ClientIP: &core.ClientIPConfig{
 | 
						|
				TimeoutSeconds: utilpointer.Int32Ptr(1),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"non-empty config, valid timeout: core.MaxClientIPServiceAffinitySeconds-1": {
 | 
						|
			ClientIP: &core.ClientIPConfig{
 | 
						|
				TimeoutSeconds: utilpointer.Int32Ptr(core.MaxClientIPServiceAffinitySeconds - 1),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"non-empty config, valid timeout: core.MaxClientIPServiceAffinitySeconds": {
 | 
						|
			ClientIP: &core.ClientIPConfig{
 | 
						|
				TimeoutSeconds: utilpointer.Int32Ptr(core.MaxClientIPServiceAffinitySeconds),
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for name, test := range successCases {
 | 
						|
		if errs := validateClientIPAffinityConfig(test, field.NewPath("field")); len(errs) != 0 {
 | 
						|
			t.Errorf("case: %s, expected success: %v", name, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	errorCases := map[string]*core.SessionAffinityConfig{
 | 
						|
		"empty session affinity config": nil,
 | 
						|
		"empty client IP config": {
 | 
						|
			ClientIP: nil,
 | 
						|
		},
 | 
						|
		"empty timeoutSeconds": {
 | 
						|
			ClientIP: &core.ClientIPConfig{
 | 
						|
				TimeoutSeconds: nil,
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"non-empty config, invalid timeout: core.MaxClientIPServiceAffinitySeconds+1": {
 | 
						|
			ClientIP: &core.ClientIPConfig{
 | 
						|
				TimeoutSeconds: utilpointer.Int32Ptr(core.MaxClientIPServiceAffinitySeconds + 1),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"non-empty config, invalid timeout: -1": {
 | 
						|
			ClientIP: &core.ClientIPConfig{
 | 
						|
				TimeoutSeconds: utilpointer.Int32Ptr(-1),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"non-empty config, invalid timeout: 0": {
 | 
						|
			ClientIP: &core.ClientIPConfig{
 | 
						|
				TimeoutSeconds: utilpointer.Int32Ptr(0),
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for name, test := range errorCases {
 | 
						|
		if errs := validateClientIPAffinityConfig(test, field.NewPath("field")); len(errs) == 0 {
 | 
						|
			t.Errorf("case: %v, expected failures: %v", name, errs)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func boolPtr(b bool) *bool {
 | 
						|
	return &b
 | 
						|
}
 |