mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-04 04:08:16 +00:00 
			
		
		
		
	This uses the generic ptr.To in k8s.io/utils to replace functions and code constructs which only serve to return pointers to intstr values. Other uses of the deprecated pointer package are updated in modified files. Signed-off-by: Stephen Kitt <skitt@redhat.com>
		
			
				
	
	
		
			980 lines
		
	
	
		
			31 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			980 lines
		
	
	
		
			31 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2016 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package statefulset
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
	"math/rand"
 | 
						|
	"reflect"
 | 
						|
	"regexp"
 | 
						|
	"sort"
 | 
						|
	"strconv"
 | 
						|
	"testing"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"k8s.io/apimachinery/pkg/api/resource"
 | 
						|
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						|
	"k8s.io/apimachinery/pkg/runtime"
 | 
						|
	"k8s.io/apimachinery/pkg/types"
 | 
						|
	"k8s.io/apimachinery/pkg/util/intstr"
 | 
						|
	"k8s.io/klog/v2"
 | 
						|
	"k8s.io/klog/v2/ktesting"
 | 
						|
 | 
						|
	apps "k8s.io/api/apps/v1"
 | 
						|
	v1 "k8s.io/api/core/v1"
 | 
						|
	podutil "k8s.io/kubernetes/pkg/api/v1/pod"
 | 
						|
	"k8s.io/kubernetes/pkg/controller/history"
 | 
						|
	"k8s.io/utils/ptr"
 | 
						|
)
 | 
						|
 | 
						|
// noopRecorder is an EventRecorder that does nothing. record.FakeRecorder has a fixed
 | 
						|
// buffer size, which causes tests to hang if that buffer's exceeded.
 | 
						|
type noopRecorder struct{}
 | 
						|
 | 
						|
func (r *noopRecorder) Event(object runtime.Object, eventtype, reason, message string) {}
 | 
						|
func (r *noopRecorder) Eventf(object runtime.Object, eventtype, reason, messageFmt string, args ...interface{}) {
 | 
						|
}
 | 
						|
func (r *noopRecorder) AnnotatedEventf(object runtime.Object, annotations map[string]string, eventtype, reason, messageFmt string, args ...interface{}) {
 | 
						|
}
 | 
						|
 | 
						|
// getClaimPodName gets the name of the Pod associated with the Claim, or an empty string if this doesn't look matching.
 | 
						|
func getClaimPodName(set *apps.StatefulSet, claim *v1.PersistentVolumeClaim) string {
 | 
						|
	podName := ""
 | 
						|
 | 
						|
	statefulClaimRegex := regexp.MustCompile(fmt.Sprintf(".*-(%s-[0-9]+)$", set.Name))
 | 
						|
	matches := statefulClaimRegex.FindStringSubmatch(claim.Name)
 | 
						|
	if len(matches) != 2 {
 | 
						|
		return podName
 | 
						|
	}
 | 
						|
	return matches[1]
 | 
						|
}
 | 
						|
 | 
						|
func TestGetParentNameAndOrdinal(t *testing.T) {
 | 
						|
	set := newStatefulSet(3)
 | 
						|
	pod := newStatefulSetPod(set, 1)
 | 
						|
	if parent, ordinal := getParentNameAndOrdinal(pod); parent != set.Name {
 | 
						|
		t.Errorf("Extracted the wrong parent name expected %s found %s", set.Name, parent)
 | 
						|
	} else if ordinal != 1 {
 | 
						|
		t.Errorf("Extracted the wrong ordinal expected %d found %d", 1, ordinal)
 | 
						|
	}
 | 
						|
	pod.Name = "1-bar"
 | 
						|
	if parent, ordinal := getParentNameAndOrdinal(pod); parent != "" {
 | 
						|
		t.Error("Expected empty string for non-member Pod parent")
 | 
						|
	} else if ordinal != -1 {
 | 
						|
		t.Error("Expected -1 for non member Pod ordinal")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestGetClaimPodName(t *testing.T) {
 | 
						|
	set := apps.StatefulSet{}
 | 
						|
	set.Name = "my-set"
 | 
						|
	claim := v1.PersistentVolumeClaim{}
 | 
						|
	claim.Name = "volume-my-set-2"
 | 
						|
	if pod := getClaimPodName(&set, &claim); pod != "my-set-2" {
 | 
						|
		t.Errorf("Expected my-set-2 found %s", pod)
 | 
						|
	}
 | 
						|
	claim.Name = "long-volume-my-set-20"
 | 
						|
	if pod := getClaimPodName(&set, &claim); pod != "my-set-20" {
 | 
						|
		t.Errorf("Expected my-set-20 found %s", pod)
 | 
						|
	}
 | 
						|
	claim.Name = "volume-2-my-set"
 | 
						|
	if pod := getClaimPodName(&set, &claim); pod != "" {
 | 
						|
		t.Errorf("Expected empty string found %s", pod)
 | 
						|
	}
 | 
						|
	claim.Name = "volume-pod-2"
 | 
						|
	if pod := getClaimPodName(&set, &claim); pod != "" {
 | 
						|
		t.Errorf("Expected empty string found %s", pod)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestIsMemberOf(t *testing.T) {
 | 
						|
	set := newStatefulSet(3)
 | 
						|
	set2 := newStatefulSet(3)
 | 
						|
	set2.Name = "foo2"
 | 
						|
	pod := newStatefulSetPod(set, 1)
 | 
						|
	if !isMemberOf(set, pod) {
 | 
						|
		t.Error("isMemberOf returned false negative")
 | 
						|
	}
 | 
						|
	if isMemberOf(set2, pod) {
 | 
						|
		t.Error("isMemberOf returned false positive")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestIdentityMatches(t *testing.T) {
 | 
						|
	set := newStatefulSet(3)
 | 
						|
	pod := newStatefulSetPod(set, 1)
 | 
						|
	if !identityMatches(set, pod) {
 | 
						|
		t.Error("Newly created Pod has a bad identity")
 | 
						|
	}
 | 
						|
	pod.Name = "foo"
 | 
						|
	if identityMatches(set, pod) {
 | 
						|
		t.Error("identity matches for a Pod with the wrong name")
 | 
						|
	}
 | 
						|
	pod = newStatefulSetPod(set, 1)
 | 
						|
	pod.Namespace = ""
 | 
						|
	if identityMatches(set, pod) {
 | 
						|
		t.Error("identity matches for a Pod with the wrong namespace")
 | 
						|
	}
 | 
						|
	pod = newStatefulSetPod(set, 1)
 | 
						|
	delete(pod.Labels, apps.StatefulSetPodNameLabel)
 | 
						|
	if identityMatches(set, pod) {
 | 
						|
		t.Error("identity matches for a Pod with the wrong statefulSetPodNameLabel")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestStorageMatches(t *testing.T) {
 | 
						|
	set := newStatefulSet(3)
 | 
						|
	pod := newStatefulSetPod(set, 1)
 | 
						|
	if !storageMatches(set, pod) {
 | 
						|
		t.Error("Newly created Pod has a invalid storage")
 | 
						|
	}
 | 
						|
	pod.Spec.Volumes = nil
 | 
						|
	if storageMatches(set, pod) {
 | 
						|
		t.Error("Pod with invalid Volumes has valid storage")
 | 
						|
	}
 | 
						|
	pod = newStatefulSetPod(set, 1)
 | 
						|
	for i := range pod.Spec.Volumes {
 | 
						|
		pod.Spec.Volumes[i].PersistentVolumeClaim = nil
 | 
						|
	}
 | 
						|
	if storageMatches(set, pod) {
 | 
						|
		t.Error("Pod with invalid Volumes claim valid storage")
 | 
						|
	}
 | 
						|
	pod = newStatefulSetPod(set, 1)
 | 
						|
	for i := range pod.Spec.Volumes {
 | 
						|
		if pod.Spec.Volumes[i].PersistentVolumeClaim != nil {
 | 
						|
			pod.Spec.Volumes[i].PersistentVolumeClaim.ClaimName = "foo"
 | 
						|
		}
 | 
						|
	}
 | 
						|
	if storageMatches(set, pod) {
 | 
						|
		t.Error("Pod with invalid Volumes claim valid storage")
 | 
						|
	}
 | 
						|
	pod = newStatefulSetPod(set, 1)
 | 
						|
	pod.Name = "bar"
 | 
						|
	if storageMatches(set, pod) {
 | 
						|
		t.Error("Pod with invalid ordinal has valid storage")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestUpdateIdentity(t *testing.T) {
 | 
						|
	set := newStatefulSet(3)
 | 
						|
	pod := newStatefulSetPod(set, 1)
 | 
						|
	if !identityMatches(set, pod) {
 | 
						|
		t.Error("Newly created Pod has a bad identity")
 | 
						|
	}
 | 
						|
	pod.Namespace = ""
 | 
						|
	if identityMatches(set, pod) {
 | 
						|
		t.Error("identity matches for a Pod with the wrong namespace")
 | 
						|
	}
 | 
						|
	updateIdentity(set, pod)
 | 
						|
	if !identityMatches(set, pod) {
 | 
						|
		t.Error("updateIdentity failed to update the Pods namespace")
 | 
						|
	}
 | 
						|
	delete(pod.Labels, apps.StatefulSetPodNameLabel)
 | 
						|
	updateIdentity(set, pod)
 | 
						|
	if !identityMatches(set, pod) {
 | 
						|
		t.Error("updateIdentity failed to restore the statefulSetPodName label")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestUpdateStorage(t *testing.T) {
 | 
						|
	set := newStatefulSet(3)
 | 
						|
	pod := newStatefulSetPod(set, 1)
 | 
						|
	if !storageMatches(set, pod) {
 | 
						|
		t.Error("Newly created Pod has a invalid storage")
 | 
						|
	}
 | 
						|
	pod.Spec.Volumes = nil
 | 
						|
	if storageMatches(set, pod) {
 | 
						|
		t.Error("Pod with invalid Volumes has valid storage")
 | 
						|
	}
 | 
						|
	updateStorage(set, pod)
 | 
						|
	if !storageMatches(set, pod) {
 | 
						|
		t.Error("updateStorage failed to recreate volumes")
 | 
						|
	}
 | 
						|
	pod = newStatefulSetPod(set, 1)
 | 
						|
	for i := range pod.Spec.Volumes {
 | 
						|
		pod.Spec.Volumes[i].PersistentVolumeClaim = nil
 | 
						|
	}
 | 
						|
	if storageMatches(set, pod) {
 | 
						|
		t.Error("Pod with invalid Volumes claim valid storage")
 | 
						|
	}
 | 
						|
	updateStorage(set, pod)
 | 
						|
	if !storageMatches(set, pod) {
 | 
						|
		t.Error("updateStorage failed to recreate volume claims")
 | 
						|
	}
 | 
						|
	pod = newStatefulSetPod(set, 1)
 | 
						|
	for i := range pod.Spec.Volumes {
 | 
						|
		if pod.Spec.Volumes[i].PersistentVolumeClaim != nil {
 | 
						|
			pod.Spec.Volumes[i].PersistentVolumeClaim.ClaimName = "foo"
 | 
						|
		}
 | 
						|
	}
 | 
						|
	if storageMatches(set, pod) {
 | 
						|
		t.Error("Pod with invalid Volumes claim valid storage")
 | 
						|
	}
 | 
						|
	updateStorage(set, pod)
 | 
						|
	if !storageMatches(set, pod) {
 | 
						|
		t.Error("updateStorage failed to recreate volume claim names")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestGetPersistentVolumeClaimRetentionPolicy(t *testing.T) {
 | 
						|
	retainPolicy := apps.StatefulSetPersistentVolumeClaimRetentionPolicy{
 | 
						|
		WhenScaled:  apps.RetainPersistentVolumeClaimRetentionPolicyType,
 | 
						|
		WhenDeleted: apps.RetainPersistentVolumeClaimRetentionPolicyType,
 | 
						|
	}
 | 
						|
	scaledownPolicy := apps.StatefulSetPersistentVolumeClaimRetentionPolicy{
 | 
						|
		WhenScaled:  apps.DeletePersistentVolumeClaimRetentionPolicyType,
 | 
						|
		WhenDeleted: apps.RetainPersistentVolumeClaimRetentionPolicyType,
 | 
						|
	}
 | 
						|
 | 
						|
	set := apps.StatefulSet{}
 | 
						|
	set.Spec.PersistentVolumeClaimRetentionPolicy = &retainPolicy
 | 
						|
	got := getPersistentVolumeClaimRetentionPolicy(&set)
 | 
						|
	if got.WhenScaled != apps.RetainPersistentVolumeClaimRetentionPolicyType || got.WhenDeleted != apps.RetainPersistentVolumeClaimRetentionPolicyType {
 | 
						|
		t.Errorf("Expected retain policy")
 | 
						|
	}
 | 
						|
	set.Spec.PersistentVolumeClaimRetentionPolicy = &scaledownPolicy
 | 
						|
	got = getPersistentVolumeClaimRetentionPolicy(&set)
 | 
						|
	if got.WhenScaled != apps.DeletePersistentVolumeClaimRetentionPolicyType || got.WhenDeleted != apps.RetainPersistentVolumeClaimRetentionPolicyType {
 | 
						|
		t.Errorf("Expected scaledown policy")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestClaimOwnerMatchesSetAndPod(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		name            string
 | 
						|
		scaleDownPolicy apps.PersistentVolumeClaimRetentionPolicyType
 | 
						|
		setDeletePolicy apps.PersistentVolumeClaimRetentionPolicyType
 | 
						|
		needsPodRef     bool
 | 
						|
		needsSetRef     bool
 | 
						|
		replicas        int32
 | 
						|
		ordinal         int
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name:            "retain",
 | 
						|
			scaleDownPolicy: apps.RetainPersistentVolumeClaimRetentionPolicyType,
 | 
						|
			setDeletePolicy: apps.RetainPersistentVolumeClaimRetentionPolicyType,
 | 
						|
			needsPodRef:     false,
 | 
						|
			needsSetRef:     false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:            "on SS delete",
 | 
						|
			scaleDownPolicy: apps.RetainPersistentVolumeClaimRetentionPolicyType,
 | 
						|
			setDeletePolicy: apps.DeletePersistentVolumeClaimRetentionPolicyType,
 | 
						|
			needsPodRef:     false,
 | 
						|
			needsSetRef:     true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:            "on scaledown only, condemned",
 | 
						|
			scaleDownPolicy: apps.DeletePersistentVolumeClaimRetentionPolicyType,
 | 
						|
			setDeletePolicy: apps.RetainPersistentVolumeClaimRetentionPolicyType,
 | 
						|
			needsPodRef:     true,
 | 
						|
			needsSetRef:     false,
 | 
						|
			replicas:        2,
 | 
						|
			ordinal:         2,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:            "on scaledown only, remains",
 | 
						|
			scaleDownPolicy: apps.DeletePersistentVolumeClaimRetentionPolicyType,
 | 
						|
			setDeletePolicy: apps.RetainPersistentVolumeClaimRetentionPolicyType,
 | 
						|
			needsPodRef:     false,
 | 
						|
			needsSetRef:     false,
 | 
						|
			replicas:        2,
 | 
						|
			ordinal:         1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:            "on both, condemned",
 | 
						|
			scaleDownPolicy: apps.DeletePersistentVolumeClaimRetentionPolicyType,
 | 
						|
			setDeletePolicy: apps.DeletePersistentVolumeClaimRetentionPolicyType,
 | 
						|
			needsPodRef:     true,
 | 
						|
			needsSetRef:     false,
 | 
						|
			replicas:        2,
 | 
						|
			ordinal:         2,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:            "on both, remains",
 | 
						|
			scaleDownPolicy: apps.DeletePersistentVolumeClaimRetentionPolicyType,
 | 
						|
			setDeletePolicy: apps.DeletePersistentVolumeClaimRetentionPolicyType,
 | 
						|
			needsPodRef:     false,
 | 
						|
			needsSetRef:     true,
 | 
						|
			replicas:        2,
 | 
						|
			ordinal:         1,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, tc := range testCases {
 | 
						|
		for _, useOtherRefs := range []bool{false, true} {
 | 
						|
			for _, setPodRef := range []bool{false, true} {
 | 
						|
				for _, setSetRef := range []bool{false, true} {
 | 
						|
					_, ctx := ktesting.NewTestContext(t)
 | 
						|
					logger := klog.FromContext(ctx)
 | 
						|
					claim := v1.PersistentVolumeClaim{}
 | 
						|
					claim.Name = "target-claim"
 | 
						|
					pod := v1.Pod{}
 | 
						|
					pod.Name = fmt.Sprintf("pod-%d", tc.ordinal)
 | 
						|
					pod.GetObjectMeta().SetUID("pod-123")
 | 
						|
					set := apps.StatefulSet{}
 | 
						|
					set.Name = "stateful-set"
 | 
						|
					set.GetObjectMeta().SetUID("ss-456")
 | 
						|
					set.Spec.PersistentVolumeClaimRetentionPolicy = &apps.StatefulSetPersistentVolumeClaimRetentionPolicy{
 | 
						|
						WhenScaled:  tc.scaleDownPolicy,
 | 
						|
						WhenDeleted: tc.setDeletePolicy,
 | 
						|
					}
 | 
						|
					set.Spec.Replicas = &tc.replicas
 | 
						|
					if setPodRef {
 | 
						|
						setOwnerRef(&claim, &pod, &pod.TypeMeta)
 | 
						|
					}
 | 
						|
					if setSetRef {
 | 
						|
						setOwnerRef(&claim, &set, &set.TypeMeta)
 | 
						|
					}
 | 
						|
					if useOtherRefs {
 | 
						|
						randomObject1 := v1.Pod{}
 | 
						|
						randomObject1.Name = "rand1"
 | 
						|
						randomObject1.GetObjectMeta().SetUID("rand1-abc")
 | 
						|
						randomObject2 := v1.Pod{}
 | 
						|
						randomObject2.Name = "rand2"
 | 
						|
						randomObject2.GetObjectMeta().SetUID("rand2-def")
 | 
						|
						setOwnerRef(&claim, &randomObject1, &randomObject1.TypeMeta)
 | 
						|
						setOwnerRef(&claim, &randomObject2, &randomObject2.TypeMeta)
 | 
						|
					}
 | 
						|
					shouldMatch := setPodRef == tc.needsPodRef && setSetRef == tc.needsSetRef
 | 
						|
					if claimOwnerMatchesSetAndPod(logger, &claim, &set, &pod) != shouldMatch {
 | 
						|
						t.Errorf("Bad match for %s with pod=%v,set=%v,others=%v", tc.name, setPodRef, setSetRef, useOtherRefs)
 | 
						|
					}
 | 
						|
				}
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestUpdateClaimOwnerRefForSetAndPod(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		name            string
 | 
						|
		scaleDownPolicy apps.PersistentVolumeClaimRetentionPolicyType
 | 
						|
		setDeletePolicy apps.PersistentVolumeClaimRetentionPolicyType
 | 
						|
		condemned       bool
 | 
						|
		needsPodRef     bool
 | 
						|
		needsSetRef     bool
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name:            "retain",
 | 
						|
			scaleDownPolicy: apps.RetainPersistentVolumeClaimRetentionPolicyType,
 | 
						|
			setDeletePolicy: apps.RetainPersistentVolumeClaimRetentionPolicyType,
 | 
						|
			condemned:       false,
 | 
						|
			needsPodRef:     false,
 | 
						|
			needsSetRef:     false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:            "delete with set",
 | 
						|
			scaleDownPolicy: apps.RetainPersistentVolumeClaimRetentionPolicyType,
 | 
						|
			setDeletePolicy: apps.DeletePersistentVolumeClaimRetentionPolicyType,
 | 
						|
			condemned:       false,
 | 
						|
			needsPodRef:     false,
 | 
						|
			needsSetRef:     true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:            "delete with scaledown, not condemned",
 | 
						|
			scaleDownPolicy: apps.DeletePersistentVolumeClaimRetentionPolicyType,
 | 
						|
			setDeletePolicy: apps.RetainPersistentVolumeClaimRetentionPolicyType,
 | 
						|
			condemned:       false,
 | 
						|
			needsPodRef:     false,
 | 
						|
			needsSetRef:     false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:            "delete on scaledown, condemned",
 | 
						|
			scaleDownPolicy: apps.DeletePersistentVolumeClaimRetentionPolicyType,
 | 
						|
			setDeletePolicy: apps.RetainPersistentVolumeClaimRetentionPolicyType,
 | 
						|
			condemned:       true,
 | 
						|
			needsPodRef:     true,
 | 
						|
			needsSetRef:     false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:            "delete on both, not condemned",
 | 
						|
			scaleDownPolicy: apps.DeletePersistentVolumeClaimRetentionPolicyType,
 | 
						|
			setDeletePolicy: apps.DeletePersistentVolumeClaimRetentionPolicyType,
 | 
						|
			condemned:       false,
 | 
						|
			needsPodRef:     false,
 | 
						|
			needsSetRef:     true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:            "delete on both, condemned",
 | 
						|
			scaleDownPolicy: apps.DeletePersistentVolumeClaimRetentionPolicyType,
 | 
						|
			setDeletePolicy: apps.DeletePersistentVolumeClaimRetentionPolicyType,
 | 
						|
			condemned:       true,
 | 
						|
			needsPodRef:     true,
 | 
						|
			needsSetRef:     false,
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for _, tc := range testCases {
 | 
						|
		for _, hasPodRef := range []bool{true, false} {
 | 
						|
			for _, hasSetRef := range []bool{true, false} {
 | 
						|
				_, ctx := ktesting.NewTestContext(t)
 | 
						|
				logger := klog.FromContext(ctx)
 | 
						|
				set := apps.StatefulSet{}
 | 
						|
				set.Name = "ss"
 | 
						|
				numReplicas := int32(5)
 | 
						|
				set.Spec.Replicas = &numReplicas
 | 
						|
				set.SetUID("ss-123")
 | 
						|
				set.Spec.PersistentVolumeClaimRetentionPolicy = &apps.StatefulSetPersistentVolumeClaimRetentionPolicy{
 | 
						|
					WhenScaled:  tc.scaleDownPolicy,
 | 
						|
					WhenDeleted: tc.setDeletePolicy,
 | 
						|
				}
 | 
						|
				pod := v1.Pod{}
 | 
						|
				if tc.condemned {
 | 
						|
					pod.Name = "pod-8"
 | 
						|
				} else {
 | 
						|
					pod.Name = "pod-1"
 | 
						|
				}
 | 
						|
				pod.SetUID("pod-456")
 | 
						|
				claim := v1.PersistentVolumeClaim{}
 | 
						|
				if hasPodRef {
 | 
						|
					setOwnerRef(&claim, &pod, &pod.TypeMeta)
 | 
						|
				}
 | 
						|
				if hasSetRef {
 | 
						|
					setOwnerRef(&claim, &set, &set.TypeMeta)
 | 
						|
				}
 | 
						|
				needsUpdate := hasPodRef != tc.needsPodRef || hasSetRef != tc.needsSetRef
 | 
						|
				shouldUpdate := updateClaimOwnerRefForSetAndPod(logger, &claim, &set, &pod)
 | 
						|
				if shouldUpdate != needsUpdate {
 | 
						|
					t.Errorf("Bad update for %s hasPodRef=%v hasSetRef=%v", tc.name, hasPodRef, hasSetRef)
 | 
						|
				}
 | 
						|
				if hasOwnerRef(&claim, &pod) != tc.needsPodRef {
 | 
						|
					t.Errorf("Bad pod ref for %s hasPodRef=%v hasSetRef=%v", tc.name, hasPodRef, hasSetRef)
 | 
						|
				}
 | 
						|
				if hasOwnerRef(&claim, &set) != tc.needsSetRef {
 | 
						|
					t.Errorf("Bad set ref for %s hasPodRef=%v hasSetRef=%v", tc.name, hasPodRef, hasSetRef)
 | 
						|
				}
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestHasOwnerRef(t *testing.T) {
 | 
						|
	target := v1.Pod{}
 | 
						|
	target.SetOwnerReferences([]metav1.OwnerReference{
 | 
						|
		{UID: "123"}, {UID: "456"}})
 | 
						|
	ownerA := v1.Pod{}
 | 
						|
	ownerA.GetObjectMeta().SetUID("123")
 | 
						|
	ownerB := v1.Pod{}
 | 
						|
	ownerB.GetObjectMeta().SetUID("789")
 | 
						|
	if !hasOwnerRef(&target, &ownerA) {
 | 
						|
		t.Error("Missing owner")
 | 
						|
	}
 | 
						|
	if hasOwnerRef(&target, &ownerB) {
 | 
						|
		t.Error("Unexpected owner")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestHasStaleOwnerRef(t *testing.T) {
 | 
						|
	target := v1.Pod{}
 | 
						|
	target.SetOwnerReferences([]metav1.OwnerReference{
 | 
						|
		{Name: "bob", UID: "123"}, {Name: "shirley", UID: "456"}})
 | 
						|
	ownerA := v1.Pod{}
 | 
						|
	ownerA.SetUID("123")
 | 
						|
	ownerA.Name = "bob"
 | 
						|
	ownerB := v1.Pod{}
 | 
						|
	ownerB.Name = "shirley"
 | 
						|
	ownerB.SetUID("789")
 | 
						|
	ownerC := v1.Pod{}
 | 
						|
	ownerC.Name = "yvonne"
 | 
						|
	ownerC.SetUID("345")
 | 
						|
	if hasStaleOwnerRef(&target, &ownerA) {
 | 
						|
		t.Error("ownerA should not be stale")
 | 
						|
	}
 | 
						|
	if !hasStaleOwnerRef(&target, &ownerB) {
 | 
						|
		t.Error("ownerB should be stale")
 | 
						|
	}
 | 
						|
	if hasStaleOwnerRef(&target, &ownerC) {
 | 
						|
		t.Error("ownerC should not be stale")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetOwnerRef(t *testing.T) {
 | 
						|
	target := v1.Pod{}
 | 
						|
	ownerA := v1.Pod{}
 | 
						|
	ownerA.Name = "A"
 | 
						|
	ownerA.GetObjectMeta().SetUID("ABC")
 | 
						|
	if setOwnerRef(&target, &ownerA, &ownerA.TypeMeta) != true {
 | 
						|
		t.Errorf("Unexpected lack of update")
 | 
						|
	}
 | 
						|
	ownerRefs := target.GetObjectMeta().GetOwnerReferences()
 | 
						|
	if len(ownerRefs) != 1 {
 | 
						|
		t.Errorf("Unexpected owner ref count: %d", len(ownerRefs))
 | 
						|
	}
 | 
						|
	if ownerRefs[0].UID != "ABC" {
 | 
						|
		t.Errorf("Unexpected owner UID %v", ownerRefs[0].UID)
 | 
						|
	}
 | 
						|
	if setOwnerRef(&target, &ownerA, &ownerA.TypeMeta) != false {
 | 
						|
		t.Errorf("Unexpected update")
 | 
						|
	}
 | 
						|
	if len(target.GetObjectMeta().GetOwnerReferences()) != 1 {
 | 
						|
		t.Error("Unexpected duplicate reference")
 | 
						|
	}
 | 
						|
	ownerB := v1.Pod{}
 | 
						|
	ownerB.Name = "B"
 | 
						|
	ownerB.GetObjectMeta().SetUID("BCD")
 | 
						|
	if setOwnerRef(&target, &ownerB, &ownerB.TypeMeta) != true {
 | 
						|
		t.Error("Unexpected lack of second update")
 | 
						|
	}
 | 
						|
	ownerRefs = target.GetObjectMeta().GetOwnerReferences()
 | 
						|
	if len(ownerRefs) != 2 {
 | 
						|
		t.Errorf("Unexpected owner ref count: %d", len(ownerRefs))
 | 
						|
	}
 | 
						|
	if ownerRefs[0].UID != "ABC" || ownerRefs[1].UID != "BCD" {
 | 
						|
		t.Errorf("Bad second ownerRefs: %v", ownerRefs)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestRemoveOwnerRef(t *testing.T) {
 | 
						|
	target := v1.Pod{}
 | 
						|
	ownerA := v1.Pod{}
 | 
						|
	ownerA.Name = "A"
 | 
						|
	ownerA.GetObjectMeta().SetUID("ABC")
 | 
						|
	if removeOwnerRef(&target, &ownerA) != false {
 | 
						|
		t.Error("Unexpected update on empty remove")
 | 
						|
	}
 | 
						|
	setOwnerRef(&target, &ownerA, &ownerA.TypeMeta)
 | 
						|
	if removeOwnerRef(&target, &ownerA) != true {
 | 
						|
		t.Error("Unexpected lack of update")
 | 
						|
	}
 | 
						|
	if len(target.GetObjectMeta().GetOwnerReferences()) != 0 {
 | 
						|
		t.Error("Unexpected owner reference remains")
 | 
						|
	}
 | 
						|
 | 
						|
	ownerB := v1.Pod{}
 | 
						|
	ownerB.Name = "B"
 | 
						|
	ownerB.GetObjectMeta().SetUID("BCD")
 | 
						|
 | 
						|
	setOwnerRef(&target, &ownerA, &ownerA.TypeMeta)
 | 
						|
	if removeOwnerRef(&target, &ownerB) != false {
 | 
						|
		t.Error("Unexpected update for mismatched owner")
 | 
						|
	}
 | 
						|
	if len(target.GetObjectMeta().GetOwnerReferences()) != 1 {
 | 
						|
		t.Error("Missing ref after no-op remove")
 | 
						|
	}
 | 
						|
	setOwnerRef(&target, &ownerB, &ownerB.TypeMeta)
 | 
						|
	if removeOwnerRef(&target, &ownerA) != true {
 | 
						|
		t.Error("Missing update for second remove")
 | 
						|
	}
 | 
						|
	ownerRefs := target.GetObjectMeta().GetOwnerReferences()
 | 
						|
	if len(ownerRefs) != 1 {
 | 
						|
		t.Error("Extra ref after second remove")
 | 
						|
	}
 | 
						|
	if ownerRefs[0].UID != "BCD" {
 | 
						|
		t.Error("Bad UID after second remove")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestIsRunningAndReady(t *testing.T) {
 | 
						|
	set := newStatefulSet(3)
 | 
						|
	pod := newStatefulSetPod(set, 1)
 | 
						|
	if isRunningAndReady(pod) {
 | 
						|
		t.Error("isRunningAndReady does not respect Pod phase")
 | 
						|
	}
 | 
						|
	pod.Status.Phase = v1.PodRunning
 | 
						|
	if isRunningAndReady(pod) {
 | 
						|
		t.Error("isRunningAndReady does not respect Pod condition")
 | 
						|
	}
 | 
						|
	condition := v1.PodCondition{Type: v1.PodReady, Status: v1.ConditionTrue}
 | 
						|
	podutil.UpdatePodCondition(&pod.Status, &condition)
 | 
						|
	if !isRunningAndReady(pod) {
 | 
						|
		t.Error("Pod should be running and ready")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestAscendingOrdinal(t *testing.T) {
 | 
						|
	set := newStatefulSet(10)
 | 
						|
	pods := make([]*v1.Pod, 10)
 | 
						|
	perm := rand.Perm(10)
 | 
						|
	for i, v := range perm {
 | 
						|
		pods[i] = newStatefulSetPod(set, v)
 | 
						|
	}
 | 
						|
	sort.Sort(ascendingOrdinal(pods))
 | 
						|
	if !sort.IsSorted(ascendingOrdinal(pods)) {
 | 
						|
		t.Error("ascendingOrdinal fails to sort Pods")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestOverlappingStatefulSets(t *testing.T) {
 | 
						|
	sets := make([]*apps.StatefulSet, 10)
 | 
						|
	perm := rand.Perm(10)
 | 
						|
	for i, v := range perm {
 | 
						|
		sets[i] = newStatefulSet(10)
 | 
						|
		sets[i].CreationTimestamp = metav1.NewTime(sets[i].CreationTimestamp.Add(time.Duration(v) * time.Second))
 | 
						|
	}
 | 
						|
	sort.Sort(overlappingStatefulSets(sets))
 | 
						|
	if !sort.IsSorted(overlappingStatefulSets(sets)) {
 | 
						|
		t.Error("ascendingOrdinal fails to sort Pods")
 | 
						|
	}
 | 
						|
	for i, v := range perm {
 | 
						|
		sets[i] = newStatefulSet(10)
 | 
						|
		sets[i].Name = strconv.FormatInt(int64(v), 10)
 | 
						|
	}
 | 
						|
	sort.Sort(overlappingStatefulSets(sets))
 | 
						|
	if !sort.IsSorted(overlappingStatefulSets(sets)) {
 | 
						|
		t.Error("ascendingOrdinal fails to sort Pods")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestNewPodControllerRef(t *testing.T) {
 | 
						|
	set := newStatefulSet(1)
 | 
						|
	pod := newStatefulSetPod(set, 0)
 | 
						|
	controllerRef := metav1.GetControllerOf(pod)
 | 
						|
	if controllerRef == nil {
 | 
						|
		t.Fatalf("No ControllerRef found on new pod")
 | 
						|
	}
 | 
						|
	if got, want := controllerRef.APIVersion, apps.SchemeGroupVersion.String(); got != want {
 | 
						|
		t.Errorf("controllerRef.APIVersion = %q, want %q", got, want)
 | 
						|
	}
 | 
						|
	if got, want := controllerRef.Kind, "StatefulSet"; got != want {
 | 
						|
		t.Errorf("controllerRef.Kind = %q, want %q", got, want)
 | 
						|
	}
 | 
						|
	if got, want := controllerRef.Name, set.Name; got != want {
 | 
						|
		t.Errorf("controllerRef.Name = %q, want %q", got, want)
 | 
						|
	}
 | 
						|
	if got, want := controllerRef.UID, set.UID; got != want {
 | 
						|
		t.Errorf("controllerRef.UID = %q, want %q", got, want)
 | 
						|
	}
 | 
						|
	if got, want := *controllerRef.Controller, true; got != want {
 | 
						|
		t.Errorf("controllerRef.Controller = %v, want %v", got, want)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestCreateApplyRevision(t *testing.T) {
 | 
						|
	set := newStatefulSet(1)
 | 
						|
	set.Status.CollisionCount = new(int32)
 | 
						|
	revision, err := newRevision(set, 1, set.Status.CollisionCount)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	set.Spec.Template.Spec.Containers[0].Name = "foo"
 | 
						|
	if set.Annotations == nil {
 | 
						|
		set.Annotations = make(map[string]string)
 | 
						|
	}
 | 
						|
	key := "foo"
 | 
						|
	expectedValue := "bar"
 | 
						|
	set.Annotations[key] = expectedValue
 | 
						|
	restoredSet, err := ApplyRevision(set, revision)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	restoredRevision, err := newRevision(restoredSet, 2, restoredSet.Status.CollisionCount)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	if !history.EqualRevision(revision, restoredRevision) {
 | 
						|
		t.Errorf("wanted %v got %v", string(revision.Data.Raw), string(restoredRevision.Data.Raw))
 | 
						|
	}
 | 
						|
	value, ok := restoredRevision.Annotations[key]
 | 
						|
	if !ok {
 | 
						|
		t.Errorf("missing annotation %s", key)
 | 
						|
	}
 | 
						|
	if value != expectedValue {
 | 
						|
		t.Errorf("for annotation %s wanted %s got %s", key, expectedValue, value)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestRollingUpdateApplyRevision(t *testing.T) {
 | 
						|
	set := newStatefulSet(1)
 | 
						|
	set.Status.CollisionCount = new(int32)
 | 
						|
	currentSet := set.DeepCopy()
 | 
						|
	currentRevision, err := newRevision(set, 1, set.Status.CollisionCount)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	set.Spec.Template.Spec.Containers[0].Env = []v1.EnvVar{{Name: "foo", Value: "bar"}}
 | 
						|
	updateSet := set.DeepCopy()
 | 
						|
	updateRevision, err := newRevision(set, 2, set.Status.CollisionCount)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	restoredCurrentSet, err := ApplyRevision(set, currentRevision)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	if !reflect.DeepEqual(currentSet.Spec.Template, restoredCurrentSet.Spec.Template) {
 | 
						|
		t.Errorf("want %v got %v", currentSet.Spec.Template, restoredCurrentSet.Spec.Template)
 | 
						|
	}
 | 
						|
 | 
						|
	restoredUpdateSet, err := ApplyRevision(set, updateRevision)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	if !reflect.DeepEqual(updateSet.Spec.Template, restoredUpdateSet.Spec.Template) {
 | 
						|
		t.Errorf("want %v got %v", updateSet.Spec.Template, restoredUpdateSet.Spec.Template)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestGetPersistentVolumeClaims(t *testing.T) {
 | 
						|
 | 
						|
	// nil inherits statefulset labels
 | 
						|
	pod := newPod()
 | 
						|
	statefulSet := newStatefulSet(1)
 | 
						|
	statefulSet.Spec.Selector.MatchLabels = nil
 | 
						|
	claims := getPersistentVolumeClaims(statefulSet, pod)
 | 
						|
	pvc := newPVC("datadir-foo-0")
 | 
						|
	resultClaims := map[string]v1.PersistentVolumeClaim{"datadir": pvc}
 | 
						|
 | 
						|
	if !reflect.DeepEqual(claims, resultClaims) {
 | 
						|
		t.Fatalf("Unexpected pvc:\n %+v\n, desired pvc:\n %+v", claims, resultClaims)
 | 
						|
	}
 | 
						|
 | 
						|
	// nil inherits statefulset labels
 | 
						|
	statefulSet.Spec.Selector.MatchLabels = map[string]string{"test": "test"}
 | 
						|
	claims = getPersistentVolumeClaims(statefulSet, pod)
 | 
						|
	pvc.SetLabels(map[string]string{"test": "test"})
 | 
						|
	resultClaims = map[string]v1.PersistentVolumeClaim{"datadir": pvc}
 | 
						|
	if !reflect.DeepEqual(claims, resultClaims) {
 | 
						|
		t.Fatalf("Unexpected pvc:\n %+v\n, desired pvc:\n %+v", claims, resultClaims)
 | 
						|
	}
 | 
						|
 | 
						|
	// non-nil with non-overlapping labels merge pvc and statefulset labels
 | 
						|
	statefulSet.Spec.Selector.MatchLabels = map[string]string{"name": "foo"}
 | 
						|
	statefulSet.Spec.VolumeClaimTemplates[0].ObjectMeta.Labels = map[string]string{"test": "test"}
 | 
						|
	claims = getPersistentVolumeClaims(statefulSet, pod)
 | 
						|
	pvc.SetLabels(map[string]string{"test": "test", "name": "foo"})
 | 
						|
	resultClaims = map[string]v1.PersistentVolumeClaim{"datadir": pvc}
 | 
						|
	if !reflect.DeepEqual(claims, resultClaims) {
 | 
						|
		t.Fatalf("Unexpected pvc:\n %+v\n, desired pvc:\n %+v", claims, resultClaims)
 | 
						|
	}
 | 
						|
 | 
						|
	// non-nil with overlapping labels merge pvc and statefulset labels and prefer statefulset labels
 | 
						|
	statefulSet.Spec.Selector.MatchLabels = map[string]string{"test": "foo"}
 | 
						|
	statefulSet.Spec.VolumeClaimTemplates[0].ObjectMeta.Labels = map[string]string{"test": "test"}
 | 
						|
	claims = getPersistentVolumeClaims(statefulSet, pod)
 | 
						|
	pvc.SetLabels(map[string]string{"test": "foo"})
 | 
						|
	resultClaims = map[string]v1.PersistentVolumeClaim{"datadir": pvc}
 | 
						|
	if !reflect.DeepEqual(claims, resultClaims) {
 | 
						|
		t.Fatalf("Unexpected pvc:\n %+v\n, desired pvc:\n %+v", claims, resultClaims)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func newPod() *v1.Pod {
 | 
						|
	return &v1.Pod{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name:      "foo-0",
 | 
						|
			Namespace: v1.NamespaceDefault,
 | 
						|
		},
 | 
						|
		Spec: v1.PodSpec{
 | 
						|
			Containers: []v1.Container{
 | 
						|
				{
 | 
						|
					Name:  "nginx",
 | 
						|
					Image: "nginx",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func newPVC(name string) v1.PersistentVolumeClaim {
 | 
						|
	return v1.PersistentVolumeClaim{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Namespace: v1.NamespaceDefault,
 | 
						|
			Name:      name,
 | 
						|
		},
 | 
						|
		Spec: v1.PersistentVolumeClaimSpec{
 | 
						|
			Resources: v1.VolumeResourceRequirements{
 | 
						|
				Requests: v1.ResourceList{
 | 
						|
					v1.ResourceStorage: *resource.NewQuantity(1, resource.BinarySI),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func newStatefulSetWithVolumes(replicas int32, name string, petMounts []v1.VolumeMount, podMounts []v1.VolumeMount) *apps.StatefulSet {
 | 
						|
	mounts := append(petMounts, podMounts...)
 | 
						|
	claims := []v1.PersistentVolumeClaim{}
 | 
						|
	for _, m := range petMounts {
 | 
						|
		claims = append(claims, newPVC(m.Name))
 | 
						|
	}
 | 
						|
 | 
						|
	vols := []v1.Volume{}
 | 
						|
	for _, m := range podMounts {
 | 
						|
		vols = append(vols, v1.Volume{
 | 
						|
			Name: m.Name,
 | 
						|
			VolumeSource: v1.VolumeSource{
 | 
						|
				HostPath: &v1.HostPathVolumeSource{
 | 
						|
					Path: fmt.Sprintf("/tmp/%v", m.Name),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		})
 | 
						|
	}
 | 
						|
 | 
						|
	template := v1.PodTemplateSpec{
 | 
						|
		Spec: v1.PodSpec{
 | 
						|
			Containers: []v1.Container{
 | 
						|
				{
 | 
						|
					Name:         "nginx",
 | 
						|
					Image:        "nginx",
 | 
						|
					VolumeMounts: mounts,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Volumes: vols,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	template.Labels = map[string]string{"foo": "bar"}
 | 
						|
 | 
						|
	return &apps.StatefulSet{
 | 
						|
		TypeMeta: metav1.TypeMeta{
 | 
						|
			Kind:       "StatefulSet",
 | 
						|
			APIVersion: "apps/v1",
 | 
						|
		},
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name:      name,
 | 
						|
			Namespace: v1.NamespaceDefault,
 | 
						|
			UID:       types.UID("test"),
 | 
						|
		},
 | 
						|
		Spec: apps.StatefulSetSpec{
 | 
						|
			Selector: &metav1.LabelSelector{
 | 
						|
				MatchLabels: map[string]string{"foo": "bar"},
 | 
						|
			},
 | 
						|
			Replicas:             ptr.To(replicas),
 | 
						|
			Template:             template,
 | 
						|
			VolumeClaimTemplates: claims,
 | 
						|
			ServiceName:          "governingsvc",
 | 
						|
			UpdateStrategy:       apps.StatefulSetUpdateStrategy{Type: apps.RollingUpdateStatefulSetStrategyType},
 | 
						|
			PersistentVolumeClaimRetentionPolicy: &apps.StatefulSetPersistentVolumeClaimRetentionPolicy{
 | 
						|
				WhenScaled:  apps.RetainPersistentVolumeClaimRetentionPolicyType,
 | 
						|
				WhenDeleted: apps.RetainPersistentVolumeClaimRetentionPolicyType,
 | 
						|
			},
 | 
						|
			RevisionHistoryLimit: func() *int32 {
 | 
						|
				limit := int32(2)
 | 
						|
				return &limit
 | 
						|
			}(),
 | 
						|
		},
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func newStatefulSet(replicas int32) *apps.StatefulSet {
 | 
						|
	petMounts := []v1.VolumeMount{
 | 
						|
		{Name: "datadir", MountPath: "/tmp/zookeeper"},
 | 
						|
	}
 | 
						|
	podMounts := []v1.VolumeMount{
 | 
						|
		{Name: "home", MountPath: "/home"},
 | 
						|
	}
 | 
						|
	return newStatefulSetWithVolumes(replicas, "foo", petMounts, podMounts)
 | 
						|
}
 | 
						|
 | 
						|
func newStatefulSetWithLabels(replicas int32, name string, uid types.UID, labels map[string]string) *apps.StatefulSet {
 | 
						|
	// Converting all the map-only selectors to set-based selectors.
 | 
						|
	var testMatchExpressions []metav1.LabelSelectorRequirement
 | 
						|
	for key, value := range labels {
 | 
						|
		sel := metav1.LabelSelectorRequirement{
 | 
						|
			Key:      key,
 | 
						|
			Operator: metav1.LabelSelectorOpIn,
 | 
						|
			Values:   []string{value},
 | 
						|
		}
 | 
						|
		testMatchExpressions = append(testMatchExpressions, sel)
 | 
						|
	}
 | 
						|
	return &apps.StatefulSet{
 | 
						|
		TypeMeta: metav1.TypeMeta{
 | 
						|
			Kind:       "StatefulSet",
 | 
						|
			APIVersion: "apps/v1",
 | 
						|
		},
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name:      name,
 | 
						|
			Namespace: v1.NamespaceDefault,
 | 
						|
			UID:       uid,
 | 
						|
		},
 | 
						|
		Spec: apps.StatefulSetSpec{
 | 
						|
			Selector: &metav1.LabelSelector{
 | 
						|
				// Purposely leaving MatchLabels nil, so to ensure it will break if any link
 | 
						|
				// in the chain ignores the set-based MatchExpressions.
 | 
						|
				MatchLabels:      nil,
 | 
						|
				MatchExpressions: testMatchExpressions,
 | 
						|
			},
 | 
						|
			Replicas: ptr.To(replicas),
 | 
						|
			PersistentVolumeClaimRetentionPolicy: &apps.StatefulSetPersistentVolumeClaimRetentionPolicy{
 | 
						|
				WhenScaled:  apps.RetainPersistentVolumeClaimRetentionPolicyType,
 | 
						|
				WhenDeleted: apps.RetainPersistentVolumeClaimRetentionPolicyType,
 | 
						|
			},
 | 
						|
			Template: v1.PodTemplateSpec{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Labels: labels,
 | 
						|
				},
 | 
						|
				Spec: v1.PodSpec{
 | 
						|
					Containers: []v1.Container{
 | 
						|
						{
 | 
						|
							Name:  "nginx",
 | 
						|
							Image: "nginx",
 | 
						|
							VolumeMounts: []v1.VolumeMount{
 | 
						|
								{Name: "datadir", MountPath: "/tmp/"},
 | 
						|
								{Name: "home", MountPath: "/home"},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
					Volumes: []v1.Volume{{
 | 
						|
						Name: "home",
 | 
						|
						VolumeSource: v1.VolumeSource{
 | 
						|
							HostPath: &v1.HostPathVolumeSource{
 | 
						|
								Path: fmt.Sprintf("/tmp/%v", "home"),
 | 
						|
							},
 | 
						|
						}}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			VolumeClaimTemplates: []v1.PersistentVolumeClaim{
 | 
						|
				{
 | 
						|
					ObjectMeta: metav1.ObjectMeta{Namespace: "default", Name: "datadir"},
 | 
						|
					Spec: v1.PersistentVolumeClaimSpec{
 | 
						|
						Resources: v1.VolumeResourceRequirements{
 | 
						|
							Requests: v1.ResourceList{
 | 
						|
								v1.ResourceStorage: *resource.NewQuantity(1, resource.BinarySI),
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			ServiceName: "governingsvc",
 | 
						|
		},
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestGetStatefulSetMaxUnavailable(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		maxUnavailable         *intstr.IntOrString
 | 
						|
		replicaCount           int
 | 
						|
		expectedMaxUnavailable int
 | 
						|
	}{
 | 
						|
		// it wouldn't hurt to also test 0 and 0%, even if they should have been forbidden by API validation.
 | 
						|
		{maxUnavailable: nil, replicaCount: 10, expectedMaxUnavailable: 1},
 | 
						|
		{maxUnavailable: ptr.To(intstr.FromInt32(3)), replicaCount: 10, expectedMaxUnavailable: 3},
 | 
						|
		{maxUnavailable: ptr.To(intstr.FromInt32(3)), replicaCount: 0, expectedMaxUnavailable: 3},
 | 
						|
		{maxUnavailable: ptr.To(intstr.FromInt32(0)), replicaCount: 0, expectedMaxUnavailable: 1},
 | 
						|
		{maxUnavailable: ptr.To(intstr.FromString("10%")), replicaCount: 25, expectedMaxUnavailable: 2},
 | 
						|
		{maxUnavailable: ptr.To(intstr.FromString("100%")), replicaCount: 5, expectedMaxUnavailable: 5},
 | 
						|
		{maxUnavailable: ptr.To(intstr.FromString("50%")), replicaCount: 5, expectedMaxUnavailable: 2},
 | 
						|
		{maxUnavailable: ptr.To(intstr.FromString("10%")), replicaCount: 5, expectedMaxUnavailable: 1},
 | 
						|
		{maxUnavailable: ptr.To(intstr.FromString("1%")), replicaCount: 0, expectedMaxUnavailable: 1},
 | 
						|
		{maxUnavailable: ptr.To(intstr.FromString("0%")), replicaCount: 0, expectedMaxUnavailable: 1},
 | 
						|
	}
 | 
						|
 | 
						|
	for i, tc := range testCases {
 | 
						|
		t.Run(fmt.Sprintf("case %d", i), func(t *testing.T) {
 | 
						|
			gotMaxUnavailable, err := getStatefulSetMaxUnavailable(tc.maxUnavailable, tc.replicaCount)
 | 
						|
			if err != nil {
 | 
						|
				t.Fatal(err)
 | 
						|
			}
 | 
						|
			if gotMaxUnavailable != tc.expectedMaxUnavailable {
 | 
						|
				t.Errorf("Expected maxUnavailable %v, got pods %v", tc.expectedMaxUnavailable, gotMaxUnavailable)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 |