mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-03 19:58:17 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			704 lines
		
	
	
		
			17 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			704 lines
		
	
	
		
			17 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2015 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package v1
 | 
						|
 | 
						|
import (
 | 
						|
	"reflect"
 | 
						|
	"testing"
 | 
						|
 | 
						|
	apiequality "k8s.io/apimachinery/pkg/api/equality"
 | 
						|
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						|
	"k8s.io/apimachinery/pkg/labels"
 | 
						|
)
 | 
						|
 | 
						|
func TestAddToNodeAddresses(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		existing []NodeAddress
 | 
						|
		toAdd    []NodeAddress
 | 
						|
		expected []NodeAddress
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			existing: []NodeAddress{},
 | 
						|
			toAdd:    []NodeAddress{},
 | 
						|
			expected: []NodeAddress{},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			existing: []NodeAddress{},
 | 
						|
			toAdd: []NodeAddress{
 | 
						|
				{Type: NodeExternalIP, Address: "1.1.1.1"},
 | 
						|
				{Type: NodeHostName, Address: "localhost"},
 | 
						|
			},
 | 
						|
			expected: []NodeAddress{
 | 
						|
				{Type: NodeExternalIP, Address: "1.1.1.1"},
 | 
						|
				{Type: NodeHostName, Address: "localhost"},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			existing: []NodeAddress{},
 | 
						|
			toAdd: []NodeAddress{
 | 
						|
				{Type: NodeExternalIP, Address: "1.1.1.1"},
 | 
						|
				{Type: NodeExternalIP, Address: "1.1.1.1"},
 | 
						|
			},
 | 
						|
			expected: []NodeAddress{
 | 
						|
				{Type: NodeExternalIP, Address: "1.1.1.1"},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			existing: []NodeAddress{
 | 
						|
				{Type: NodeExternalIP, Address: "1.1.1.1"},
 | 
						|
				{Type: NodeInternalIP, Address: "10.1.1.1"},
 | 
						|
			},
 | 
						|
			toAdd: []NodeAddress{
 | 
						|
				{Type: NodeExternalIP, Address: "1.1.1.1"},
 | 
						|
				{Type: NodeHostName, Address: "localhost"},
 | 
						|
			},
 | 
						|
			expected: []NodeAddress{
 | 
						|
				{Type: NodeExternalIP, Address: "1.1.1.1"},
 | 
						|
				{Type: NodeInternalIP, Address: "10.1.1.1"},
 | 
						|
				{Type: NodeHostName, Address: "localhost"},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for i, tc := range testCases {
 | 
						|
		AddToNodeAddresses(&tc.existing, tc.toAdd...)
 | 
						|
		if !apiequality.Semantic.DeepEqual(tc.expected, tc.existing) {
 | 
						|
			t.Errorf("case[%d], expected: %v, got: %v", i, tc.expected, tc.existing)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestGetAccessModesFromString(t *testing.T) {
 | 
						|
	modes := GetAccessModesFromString("ROX")
 | 
						|
	if !containsAccessMode(modes, ReadOnlyMany) {
 | 
						|
		t.Errorf("Expected mode %s, but got %+v", ReadOnlyMany, modes)
 | 
						|
	}
 | 
						|
 | 
						|
	modes = GetAccessModesFromString("ROX,RWX")
 | 
						|
	if !containsAccessMode(modes, ReadOnlyMany) {
 | 
						|
		t.Errorf("Expected mode %s, but got %+v", ReadOnlyMany, modes)
 | 
						|
	}
 | 
						|
	if !containsAccessMode(modes, ReadWriteMany) {
 | 
						|
		t.Errorf("Expected mode %s, but got %+v", ReadWriteMany, modes)
 | 
						|
	}
 | 
						|
 | 
						|
	modes = GetAccessModesFromString("RWO,ROX,RWX")
 | 
						|
	if !containsAccessMode(modes, ReadOnlyMany) {
 | 
						|
		t.Errorf("Expected mode %s, but got %+v", ReadOnlyMany, modes)
 | 
						|
	}
 | 
						|
	if !containsAccessMode(modes, ReadWriteMany) {
 | 
						|
		t.Errorf("Expected mode %s, but got %+v", ReadWriteMany, modes)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestRemoveDuplicateAccessModes(t *testing.T) {
 | 
						|
	modes := []PersistentVolumeAccessMode{
 | 
						|
		ReadWriteOnce, ReadOnlyMany, ReadOnlyMany, ReadOnlyMany,
 | 
						|
	}
 | 
						|
	modes = removeDuplicateAccessModes(modes)
 | 
						|
	if len(modes) != 2 {
 | 
						|
		t.Errorf("Expected 2 distinct modes in set but found %v", len(modes))
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestNodeSelectorRequirementsAsSelector(t *testing.T) {
 | 
						|
	matchExpressions := []NodeSelectorRequirement{{
 | 
						|
		Key:      "foo",
 | 
						|
		Operator: NodeSelectorOpIn,
 | 
						|
		Values:   []string{"bar", "baz"},
 | 
						|
	}}
 | 
						|
	mustParse := func(s string) labels.Selector {
 | 
						|
		out, e := labels.Parse(s)
 | 
						|
		if e != nil {
 | 
						|
			panic(e)
 | 
						|
		}
 | 
						|
		return out
 | 
						|
	}
 | 
						|
	tc := []struct {
 | 
						|
		in        []NodeSelectorRequirement
 | 
						|
		out       labels.Selector
 | 
						|
		expectErr bool
 | 
						|
	}{
 | 
						|
		{in: nil, out: labels.Nothing()},
 | 
						|
		{in: []NodeSelectorRequirement{}, out: labels.Nothing()},
 | 
						|
		{
 | 
						|
			in:  matchExpressions,
 | 
						|
			out: mustParse("foo in (baz,bar)"),
 | 
						|
		},
 | 
						|
		{
 | 
						|
			in: []NodeSelectorRequirement{{
 | 
						|
				Key:      "foo",
 | 
						|
				Operator: NodeSelectorOpExists,
 | 
						|
				Values:   []string{"bar", "baz"},
 | 
						|
			}},
 | 
						|
			expectErr: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			in: []NodeSelectorRequirement{{
 | 
						|
				Key:      "foo",
 | 
						|
				Operator: NodeSelectorOpGt,
 | 
						|
				Values:   []string{"1"},
 | 
						|
			}},
 | 
						|
			out: mustParse("foo>1"),
 | 
						|
		},
 | 
						|
		{
 | 
						|
			in: []NodeSelectorRequirement{{
 | 
						|
				Key:      "bar",
 | 
						|
				Operator: NodeSelectorOpLt,
 | 
						|
				Values:   []string{"7"},
 | 
						|
			}},
 | 
						|
			out: mustParse("bar<7"),
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for i, tc := range tc {
 | 
						|
		out, err := NodeSelectorRequirementsAsSelector(tc.in)
 | 
						|
		if err == nil && tc.expectErr {
 | 
						|
			t.Errorf("[%v]expected error but got none.", i)
 | 
						|
		}
 | 
						|
		if err != nil && !tc.expectErr {
 | 
						|
			t.Errorf("[%v]did not expect error but got: %v", i, err)
 | 
						|
		}
 | 
						|
		if !reflect.DeepEqual(out, tc.out) {
 | 
						|
			t.Errorf("[%v]expected:\n\t%+v\nbut got:\n\t%+v", i, tc.out, out)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestTaintToString(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		taint          *Taint
 | 
						|
		expectedString string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			taint: &Taint{
 | 
						|
				Key:    "foo",
 | 
						|
				Value:  "bar",
 | 
						|
				Effect: TaintEffectNoSchedule,
 | 
						|
			},
 | 
						|
			expectedString: "foo=bar:NoSchedule",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			taint: &Taint{
 | 
						|
				Key:    "foo",
 | 
						|
				Effect: TaintEffectNoSchedule,
 | 
						|
			},
 | 
						|
			expectedString: "foo:NoSchedule",
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for i, tc := range testCases {
 | 
						|
		if tc.expectedString != tc.taint.ToString() {
 | 
						|
			t.Errorf("[%v] expected taint %v converted to %s, got %s", i, tc.taint, tc.expectedString, tc.taint.ToString())
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestMatchTaint(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		description  string
 | 
						|
		taint        *Taint
 | 
						|
		taintToMatch Taint
 | 
						|
		expectMatch  bool
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			description: "two taints with the same key,value,effect should match",
 | 
						|
			taint: &Taint{
 | 
						|
				Key:    "foo",
 | 
						|
				Value:  "bar",
 | 
						|
				Effect: TaintEffectNoSchedule,
 | 
						|
			},
 | 
						|
			taintToMatch: Taint{
 | 
						|
				Key:    "foo",
 | 
						|
				Value:  "bar",
 | 
						|
				Effect: TaintEffectNoSchedule,
 | 
						|
			},
 | 
						|
			expectMatch: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			description: "two taints with the same key,effect but different value should match",
 | 
						|
			taint: &Taint{
 | 
						|
				Key:    "foo",
 | 
						|
				Value:  "bar",
 | 
						|
				Effect: TaintEffectNoSchedule,
 | 
						|
			},
 | 
						|
			taintToMatch: Taint{
 | 
						|
				Key:    "foo",
 | 
						|
				Value:  "different-value",
 | 
						|
				Effect: TaintEffectNoSchedule,
 | 
						|
			},
 | 
						|
			expectMatch: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			description: "two taints with the different key cannot match",
 | 
						|
			taint: &Taint{
 | 
						|
				Key:    "foo",
 | 
						|
				Value:  "bar",
 | 
						|
				Effect: TaintEffectNoSchedule,
 | 
						|
			},
 | 
						|
			taintToMatch: Taint{
 | 
						|
				Key:    "different-key",
 | 
						|
				Value:  "bar",
 | 
						|
				Effect: TaintEffectNoSchedule,
 | 
						|
			},
 | 
						|
			expectMatch: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			description: "two taints with the different effect cannot match",
 | 
						|
			taint: &Taint{
 | 
						|
				Key:    "foo",
 | 
						|
				Value:  "bar",
 | 
						|
				Effect: TaintEffectNoSchedule,
 | 
						|
			},
 | 
						|
			taintToMatch: Taint{
 | 
						|
				Key:    "foo",
 | 
						|
				Value:  "bar",
 | 
						|
				Effect: TaintEffectPreferNoSchedule,
 | 
						|
			},
 | 
						|
			expectMatch: false,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, tc := range testCases {
 | 
						|
		if tc.expectMatch != tc.taint.MatchTaint(&tc.taintToMatch) {
 | 
						|
			t.Errorf("[%s] expect taint %s match taint %s", tc.description, tc.taint.ToString(), tc.taintToMatch.ToString())
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestTolerationToleratesTaint(t *testing.T) {
 | 
						|
 | 
						|
	testCases := []struct {
 | 
						|
		description     string
 | 
						|
		toleration      Toleration
 | 
						|
		taint           Taint
 | 
						|
		expectTolerated bool
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			description: "toleration and taint have the same key and effect, and operator is Exists, and taint has no value, expect tolerated",
 | 
						|
			toleration: Toleration{
 | 
						|
				Key:      "foo",
 | 
						|
				Operator: TolerationOpExists,
 | 
						|
				Effect:   TaintEffectNoSchedule,
 | 
						|
			},
 | 
						|
			taint: Taint{
 | 
						|
				Key:    "foo",
 | 
						|
				Effect: TaintEffectNoSchedule,
 | 
						|
			},
 | 
						|
			expectTolerated: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			description: "toleration and taint have the same key and effect, and operator is Exists, and taint has some value, expect tolerated",
 | 
						|
			toleration: Toleration{
 | 
						|
				Key:      "foo",
 | 
						|
				Operator: TolerationOpExists,
 | 
						|
				Effect:   TaintEffectNoSchedule,
 | 
						|
			},
 | 
						|
			taint: Taint{
 | 
						|
				Key:    "foo",
 | 
						|
				Value:  "bar",
 | 
						|
				Effect: TaintEffectNoSchedule,
 | 
						|
			},
 | 
						|
			expectTolerated: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			description: "toleration and taint have the same effect, toleration has empty key and operator is Exists, means match all taints, expect tolerated",
 | 
						|
			toleration: Toleration{
 | 
						|
				Key:      "",
 | 
						|
				Operator: TolerationOpExists,
 | 
						|
				Effect:   TaintEffectNoSchedule,
 | 
						|
			},
 | 
						|
			taint: Taint{
 | 
						|
				Key:    "foo",
 | 
						|
				Value:  "bar",
 | 
						|
				Effect: TaintEffectNoSchedule,
 | 
						|
			},
 | 
						|
			expectTolerated: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			description: "toleration and taint have the same key, effect and value, and operator is Equal, expect tolerated",
 | 
						|
			toleration: Toleration{
 | 
						|
				Key:      "foo",
 | 
						|
				Operator: TolerationOpEqual,
 | 
						|
				Value:    "bar",
 | 
						|
				Effect:   TaintEffectNoSchedule,
 | 
						|
			},
 | 
						|
			taint: Taint{
 | 
						|
				Key:    "foo",
 | 
						|
				Value:  "bar",
 | 
						|
				Effect: TaintEffectNoSchedule,
 | 
						|
			},
 | 
						|
			expectTolerated: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			description: "toleration and taint have the same key and effect, but different values, and operator is Equal, expect not tolerated",
 | 
						|
			toleration: Toleration{
 | 
						|
				Key:      "foo",
 | 
						|
				Operator: TolerationOpEqual,
 | 
						|
				Value:    "value1",
 | 
						|
				Effect:   TaintEffectNoSchedule,
 | 
						|
			},
 | 
						|
			taint: Taint{
 | 
						|
				Key:    "foo",
 | 
						|
				Value:  "value2",
 | 
						|
				Effect: TaintEffectNoSchedule,
 | 
						|
			},
 | 
						|
			expectTolerated: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			description: "toleration and taint have the same key and value, but different effects, and operator is Equal, expect not tolerated",
 | 
						|
			toleration: Toleration{
 | 
						|
				Key:      "foo",
 | 
						|
				Operator: TolerationOpEqual,
 | 
						|
				Value:    "bar",
 | 
						|
				Effect:   TaintEffectNoSchedule,
 | 
						|
			},
 | 
						|
			taint: Taint{
 | 
						|
				Key:    "foo",
 | 
						|
				Value:  "bar",
 | 
						|
				Effect: TaintEffectNoExecute,
 | 
						|
			},
 | 
						|
			expectTolerated: false,
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for _, tc := range testCases {
 | 
						|
		if tolerated := tc.toleration.ToleratesTaint(&tc.taint); tc.expectTolerated != tolerated {
 | 
						|
			t.Errorf("[%s] expect %v, got %v: toleration %+v, taint %s", tc.description, tc.expectTolerated, tolerated, tc.toleration, tc.taint.ToString())
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestTolerationsTolerateTaintsWithFilter(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		description     string
 | 
						|
		tolerations     []Toleration
 | 
						|
		taints          []Taint
 | 
						|
		applyFilter     taintsFilterFunc
 | 
						|
		expectTolerated bool
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			description:     "empty tolerations tolerate empty taints",
 | 
						|
			tolerations:     []Toleration{},
 | 
						|
			taints:          []Taint{},
 | 
						|
			applyFilter:     func(t *Taint) bool { return true },
 | 
						|
			expectTolerated: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			description: "non-empty tolerations tolerate empty taints",
 | 
						|
			tolerations: []Toleration{
 | 
						|
				{
 | 
						|
					Key:      "foo",
 | 
						|
					Operator: "Exists",
 | 
						|
					Effect:   TaintEffectNoSchedule,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			taints:          []Taint{},
 | 
						|
			applyFilter:     func(t *Taint) bool { return true },
 | 
						|
			expectTolerated: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			description: "tolerations match all taints, expect tolerated",
 | 
						|
			tolerations: []Toleration{
 | 
						|
				{
 | 
						|
					Key:      "foo",
 | 
						|
					Operator: "Exists",
 | 
						|
					Effect:   TaintEffectNoSchedule,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			taints: []Taint{
 | 
						|
				{
 | 
						|
					Key:    "foo",
 | 
						|
					Effect: TaintEffectNoSchedule,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			applyFilter:     func(t *Taint) bool { return true },
 | 
						|
			expectTolerated: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			description: "tolerations don't match taints, but no taints apply to the filter, expect tolerated",
 | 
						|
			tolerations: []Toleration{
 | 
						|
				{
 | 
						|
					Key:      "foo",
 | 
						|
					Operator: "Exists",
 | 
						|
					Effect:   TaintEffectNoSchedule,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			taints: []Taint{
 | 
						|
				{
 | 
						|
					Key:    "bar",
 | 
						|
					Effect: TaintEffectNoSchedule,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			applyFilter:     func(t *Taint) bool { return false },
 | 
						|
			expectTolerated: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			description: "no filterFunc indicated, means all taints apply to the filter, tolerations don't match taints, expect untolerated",
 | 
						|
			tolerations: []Toleration{
 | 
						|
				{
 | 
						|
					Key:      "foo",
 | 
						|
					Operator: "Exists",
 | 
						|
					Effect:   TaintEffectNoSchedule,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			taints: []Taint{
 | 
						|
				{
 | 
						|
					Key:    "bar",
 | 
						|
					Effect: TaintEffectNoSchedule,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			applyFilter:     nil,
 | 
						|
			expectTolerated: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			description: "tolerations match taints, expect tolerated",
 | 
						|
			tolerations: []Toleration{
 | 
						|
				{
 | 
						|
					Key:      "foo",
 | 
						|
					Operator: "Exists",
 | 
						|
					Effect:   TaintEffectNoExecute,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			taints: []Taint{
 | 
						|
				{
 | 
						|
					Key:    "foo",
 | 
						|
					Effect: TaintEffectNoExecute,
 | 
						|
				},
 | 
						|
				{
 | 
						|
					Key:    "bar",
 | 
						|
					Effect: TaintEffectNoSchedule,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			applyFilter:     func(t *Taint) bool { return t.Effect == TaintEffectNoExecute },
 | 
						|
			expectTolerated: true,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, tc := range testCases {
 | 
						|
		if tc.expectTolerated != TolerationsTolerateTaintsWithFilter(tc.tolerations, tc.taints, tc.applyFilter) {
 | 
						|
			filteredTaints := []Taint{}
 | 
						|
			for _, taint := range tc.taints {
 | 
						|
				if tc.applyFilter != nil && !tc.applyFilter(&taint) {
 | 
						|
					continue
 | 
						|
				}
 | 
						|
				filteredTaints = append(filteredTaints, taint)
 | 
						|
			}
 | 
						|
			t.Errorf("[%s] expect tolerations %+v tolerate filtered taints %+v in taints %+v", tc.description, tc.tolerations, filteredTaints, tc.taints)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestGetAvoidPodsFromNode(t *testing.T) {
 | 
						|
	controllerFlag := true
 | 
						|
	testCases := []struct {
 | 
						|
		node        *Node
 | 
						|
		expectValue AvoidPods
 | 
						|
		expectErr   bool
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			node:        &Node{},
 | 
						|
			expectValue: AvoidPods{},
 | 
						|
			expectErr:   false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			node: &Node{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Annotations: map[string]string{
 | 
						|
						PreferAvoidPodsAnnotationKey: `
 | 
						|
							{
 | 
						|
							    "preferAvoidPods": [
 | 
						|
							        {
 | 
						|
							            "podSignature": {
 | 
						|
							                "podController": {
 | 
						|
						                            "apiVersion": "v1",
 | 
						|
						                            "kind": "ReplicationController",
 | 
						|
						                            "name": "foo",
 | 
						|
						                            "uid": "abcdef123456",
 | 
						|
						                            "controller": true
 | 
						|
							                }
 | 
						|
							            },
 | 
						|
							            "reason": "some reason",
 | 
						|
							            "message": "some message"
 | 
						|
							        }
 | 
						|
							    ]
 | 
						|
							}`,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectValue: AvoidPods{
 | 
						|
				PreferAvoidPods: []PreferAvoidPodsEntry{
 | 
						|
					{
 | 
						|
						PodSignature: PodSignature{
 | 
						|
							PodController: &metav1.OwnerReference{
 | 
						|
								APIVersion: "v1",
 | 
						|
								Kind:       "ReplicationController",
 | 
						|
								Name:       "foo",
 | 
						|
								UID:        "abcdef123456",
 | 
						|
								Controller: &controllerFlag,
 | 
						|
							},
 | 
						|
						},
 | 
						|
						Reason:  "some reason",
 | 
						|
						Message: "some message",
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectErr: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			node: &Node{
 | 
						|
				// Missing end symbol of "podController" and "podSignature"
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Annotations: map[string]string{
 | 
						|
						PreferAvoidPodsAnnotationKey: `
 | 
						|
							{
 | 
						|
							    "preferAvoidPods": [
 | 
						|
							        {
 | 
						|
							            "podSignature": {
 | 
						|
							                "podController": {
 | 
						|
							                    "kind": "ReplicationController",
 | 
						|
							                    "apiVersion": "v1"
 | 
						|
							            "reason": "some reason",
 | 
						|
							            "message": "some message"
 | 
						|
							        }
 | 
						|
							    ]
 | 
						|
							}`,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectValue: AvoidPods{},
 | 
						|
			expectErr:   true,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for i, tc := range testCases {
 | 
						|
		v, err := GetAvoidPodsFromNodeAnnotations(tc.node.Annotations)
 | 
						|
		if err == nil && tc.expectErr {
 | 
						|
			t.Errorf("[%v]expected error but got none.", i)
 | 
						|
		}
 | 
						|
		if err != nil && !tc.expectErr {
 | 
						|
			t.Errorf("[%v]did not expect error but got: %v", i, err)
 | 
						|
		}
 | 
						|
		if !reflect.DeepEqual(tc.expectValue, v) {
 | 
						|
			t.Errorf("[%v]expect value %v but got %v with %v", i, tc.expectValue, v, v.PreferAvoidPods[0].PodSignature.PodController.Controller)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSysctlsFromPodAnnotation(t *testing.T) {
 | 
						|
	type Test struct {
 | 
						|
		annotation  string
 | 
						|
		expectValue []Sysctl
 | 
						|
		expectErr   bool
 | 
						|
	}
 | 
						|
	for i, test := range []Test{
 | 
						|
		{
 | 
						|
			annotation:  "",
 | 
						|
			expectValue: nil,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			annotation: "foo.bar",
 | 
						|
			expectErr:  true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			annotation: "=123",
 | 
						|
			expectErr:  true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			annotation:  "foo.bar=",
 | 
						|
			expectValue: []Sysctl{{Name: "foo.bar", Value: ""}},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			annotation:  "foo.bar=42",
 | 
						|
			expectValue: []Sysctl{{Name: "foo.bar", Value: "42"}},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			annotation: "foo.bar=42,",
 | 
						|
			expectErr:  true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			annotation:  "foo.bar=42,abc.def=1",
 | 
						|
			expectValue: []Sysctl{{Name: "foo.bar", Value: "42"}, {Name: "abc.def", Value: "1"}},
 | 
						|
		},
 | 
						|
	} {
 | 
						|
		sysctls, err := SysctlsFromPodAnnotation(test.annotation)
 | 
						|
		if test.expectErr && err == nil {
 | 
						|
			t.Errorf("[%v]expected error but got none", i)
 | 
						|
		} else if !test.expectErr && err != nil {
 | 
						|
			t.Errorf("[%v]did not expect error but got: %v", i, err)
 | 
						|
		} else if !reflect.DeepEqual(sysctls, test.expectValue) {
 | 
						|
			t.Errorf("[%v]expect value %v but got %v", i, test.expectValue, sysctls)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// TODO: remove when alpha support for affinity is removed
 | 
						|
func TestGetAffinityFromPodAnnotations(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		pod       *Pod
 | 
						|
		expectErr bool
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			pod:       &Pod{},
 | 
						|
			expectErr: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Annotations: map[string]string{
 | 
						|
						AffinityAnnotationKey: `
 | 
						|
						{"nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": {
 | 
						|
							"nodeSelectorTerms": [{
 | 
						|
								"matchExpressions": [{
 | 
						|
									"key": "foo",
 | 
						|
									"operator": "In",
 | 
						|
									"values": ["value1", "value2"]
 | 
						|
								}]
 | 
						|
							}]
 | 
						|
						}}}`,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectErr: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			pod: &Pod{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Annotations: map[string]string{
 | 
						|
						AffinityAnnotationKey: `
 | 
						|
						{"nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": {
 | 
						|
							"nodeSelectorTerms": [{
 | 
						|
								"matchExpressions": [{
 | 
						|
									"key": "foo",
 | 
						|
						`,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectErr: true,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for i, tc := range testCases {
 | 
						|
		_, err := GetAffinityFromPodAnnotations(tc.pod.Annotations)
 | 
						|
		if err == nil && tc.expectErr {
 | 
						|
			t.Errorf("[%v]expected error but got none.", i)
 | 
						|
		}
 | 
						|
		if err != nil && !tc.expectErr {
 | 
						|
			t.Errorf("[%v]did not expect error but got: %v", i, err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 |