topology_manager_test.go 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747
  1. /*
  2. Copyright 2019 The Kubernetes Authors.
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package topologymanager
  14. import (
  15. "fmt"
  16. "reflect"
  17. "strings"
  18. "testing"
  19. "k8s.io/api/core/v1"
  20. "k8s.io/apimachinery/pkg/types"
  21. "k8s.io/kubernetes/pkg/kubelet/cm/topologymanager/bitmask"
  22. "k8s.io/kubernetes/pkg/kubelet/lifecycle"
  23. )
  24. func NewTestBitMask(sockets ...int) bitmask.BitMask {
  25. s, _ := bitmask.NewBitMask(sockets...)
  26. return s
  27. }
  28. func TestNewManager(t *testing.T) {
  29. tcases := []struct {
  30. description string
  31. policyName string
  32. expectedPolicy string
  33. expectedError error
  34. }{
  35. {
  36. description: "Policy is set to best-effort",
  37. policyName: "best-effort",
  38. expectedPolicy: "best-effort",
  39. },
  40. {
  41. description: "Policy is set to restricted",
  42. policyName: "restricted",
  43. expectedPolicy: "restricted",
  44. },
  45. {
  46. description: "Policy is set to unknown",
  47. policyName: "unknown",
  48. expectedError: fmt.Errorf("unknown policy: \"unknown\""),
  49. },
  50. }
  51. for _, tc := range tcases {
  52. mngr, err := NewManager(nil, tc.policyName)
  53. if tc.expectedError != nil {
  54. if !strings.Contains(err.Error(), tc.expectedError.Error()) {
  55. t.Errorf("Unexpected error message. Have: %s wants %s", err.Error(), tc.expectedError.Error())
  56. }
  57. } else {
  58. rawMgr := mngr.(*manager)
  59. if rawMgr.policy.Name() != tc.expectedPolicy {
  60. t.Errorf("Unexpected policy name. Have: %q wants %q", rawMgr.policy.Name(), tc.expectedPolicy)
  61. }
  62. }
  63. }
  64. }
  65. type mockHintProvider struct {
  66. th map[string][]TopologyHint
  67. }
  68. func (m *mockHintProvider) GetTopologyHints(pod *v1.Pod, container *v1.Container) map[string][]TopologyHint {
  69. return m.th
  70. }
  71. func TestGetAffinity(t *testing.T) {
  72. tcases := []struct {
  73. name string
  74. containerName string
  75. podUID string
  76. expected TopologyHint
  77. }{
  78. {
  79. name: "case1",
  80. containerName: "nginx",
  81. podUID: "0aafa4c4-38e8-11e9-bcb1-a4bf01040474",
  82. expected: TopologyHint{},
  83. },
  84. }
  85. for _, tc := range tcases {
  86. mngr := manager{}
  87. actual := mngr.GetAffinity(tc.podUID, tc.containerName)
  88. if !reflect.DeepEqual(actual, tc.expected) {
  89. t.Errorf("Expected Affinity in result to be %v, got %v", tc.expected, actual)
  90. }
  91. }
  92. }
  93. func TestAccumulateProvidersHints(t *testing.T) {
  94. tcases := []struct {
  95. name string
  96. hp []HintProvider
  97. expected []map[string][]TopologyHint
  98. }{
  99. {
  100. name: "TopologyHint not set",
  101. hp: []HintProvider{},
  102. expected: nil,
  103. },
  104. {
  105. name: "HintProvider returns empty non-nil map[string][]TopologyHint",
  106. hp: []HintProvider{
  107. &mockHintProvider{
  108. map[string][]TopologyHint{},
  109. },
  110. },
  111. expected: []map[string][]TopologyHint{
  112. {},
  113. },
  114. },
  115. {
  116. name: "HintProvider returns - nil map[string][]TopologyHint from provider",
  117. hp: []HintProvider{
  118. &mockHintProvider{
  119. map[string][]TopologyHint{
  120. "resource": nil,
  121. },
  122. },
  123. },
  124. expected: []map[string][]TopologyHint{
  125. {
  126. "resource": nil,
  127. },
  128. },
  129. },
  130. {
  131. name: "2 HintProviders with 1 resource returns hints",
  132. hp: []HintProvider{
  133. &mockHintProvider{
  134. map[string][]TopologyHint{
  135. "resource1": {TopologyHint{}},
  136. },
  137. },
  138. &mockHintProvider{
  139. map[string][]TopologyHint{
  140. "resource2": {TopologyHint{}},
  141. },
  142. },
  143. },
  144. expected: []map[string][]TopologyHint{
  145. {
  146. "resource1": {TopologyHint{}},
  147. },
  148. {
  149. "resource2": {TopologyHint{}},
  150. },
  151. },
  152. },
  153. {
  154. name: "2 HintProviders 1 with 1 resource 1 with nil hints",
  155. hp: []HintProvider{
  156. &mockHintProvider{
  157. map[string][]TopologyHint{
  158. "resource1": {TopologyHint{}},
  159. },
  160. },
  161. &mockHintProvider{nil},
  162. },
  163. expected: []map[string][]TopologyHint{
  164. {
  165. "resource1": {TopologyHint{}},
  166. },
  167. nil,
  168. },
  169. },
  170. {
  171. name: "2 HintProviders 1 with 1 resource 1 empty hints",
  172. hp: []HintProvider{
  173. &mockHintProvider{
  174. map[string][]TopologyHint{
  175. "resource1": {TopologyHint{}},
  176. },
  177. },
  178. &mockHintProvider{
  179. map[string][]TopologyHint{},
  180. },
  181. },
  182. expected: []map[string][]TopologyHint{
  183. {
  184. "resource1": {TopologyHint{}},
  185. },
  186. {},
  187. },
  188. },
  189. {
  190. name: "HintProvider with 2 resources returns hints",
  191. hp: []HintProvider{
  192. &mockHintProvider{
  193. map[string][]TopologyHint{
  194. "resource1": {TopologyHint{}},
  195. "resource2": {TopologyHint{}},
  196. },
  197. },
  198. },
  199. expected: []map[string][]TopologyHint{
  200. {
  201. "resource1": {TopologyHint{}},
  202. "resource2": {TopologyHint{}},
  203. },
  204. },
  205. },
  206. }
  207. for _, tc := range tcases {
  208. mngr := manager{
  209. hintProviders: tc.hp,
  210. }
  211. actual := mngr.accumulateProvidersHints(&v1.Pod{}, &v1.Container{})
  212. if !reflect.DeepEqual(actual, tc.expected) {
  213. t.Errorf("Test Case %s: Expected NUMANodeAffinity in result to be %v, got %v", tc.name, tc.expected, actual)
  214. }
  215. }
  216. }
  217. type mockPolicy struct {
  218. nonePolicy
  219. ph []map[string][]TopologyHint
  220. }
  221. func (p *mockPolicy) Merge(providersHints []map[string][]TopologyHint) (TopologyHint, bool) {
  222. p.ph = providersHints
  223. return TopologyHint{}, true
  224. }
  225. func TestCalculateAffinity(t *testing.T) {
  226. tcases := []struct {
  227. name string
  228. hp []HintProvider
  229. expected []map[string][]TopologyHint
  230. }{
  231. {
  232. name: "No hint providers",
  233. hp: []HintProvider{},
  234. expected: ([]map[string][]TopologyHint)(nil),
  235. },
  236. {
  237. name: "HintProvider returns empty non-nil map[string][]TopologyHint",
  238. hp: []HintProvider{
  239. &mockHintProvider{
  240. map[string][]TopologyHint{},
  241. },
  242. },
  243. expected: []map[string][]TopologyHint{
  244. {},
  245. },
  246. },
  247. {
  248. name: "HintProvider returns -nil map[string][]TopologyHint from provider",
  249. hp: []HintProvider{
  250. &mockHintProvider{
  251. map[string][]TopologyHint{
  252. "resource": nil,
  253. },
  254. },
  255. },
  256. expected: []map[string][]TopologyHint{
  257. {
  258. "resource": nil,
  259. },
  260. },
  261. },
  262. {
  263. name: "Assorted HintProviders",
  264. hp: []HintProvider{
  265. &mockHintProvider{
  266. map[string][]TopologyHint{
  267. "resource-1/A": {
  268. {NUMANodeAffinity: NewTestBitMask(0), Preferred: true},
  269. {NUMANodeAffinity: NewTestBitMask(0, 1), Preferred: false},
  270. },
  271. "resource-1/B": {
  272. {NUMANodeAffinity: NewTestBitMask(1), Preferred: true},
  273. {NUMANodeAffinity: NewTestBitMask(1, 2), Preferred: false},
  274. },
  275. },
  276. },
  277. &mockHintProvider{
  278. map[string][]TopologyHint{
  279. "resource-2/A": {
  280. {NUMANodeAffinity: NewTestBitMask(2), Preferred: true},
  281. {NUMANodeAffinity: NewTestBitMask(3, 4), Preferred: false},
  282. },
  283. "resource-2/B": {
  284. {NUMANodeAffinity: NewTestBitMask(2), Preferred: true},
  285. {NUMANodeAffinity: NewTestBitMask(3, 4), Preferred: false},
  286. },
  287. },
  288. },
  289. &mockHintProvider{
  290. map[string][]TopologyHint{
  291. "resource-3": nil,
  292. },
  293. },
  294. },
  295. expected: []map[string][]TopologyHint{
  296. {
  297. "resource-1/A": {
  298. {NUMANodeAffinity: NewTestBitMask(0), Preferred: true},
  299. {NUMANodeAffinity: NewTestBitMask(0, 1), Preferred: false},
  300. },
  301. "resource-1/B": {
  302. {NUMANodeAffinity: NewTestBitMask(1), Preferred: true},
  303. {NUMANodeAffinity: NewTestBitMask(1, 2), Preferred: false},
  304. },
  305. },
  306. {
  307. "resource-2/A": {
  308. {NUMANodeAffinity: NewTestBitMask(2), Preferred: true},
  309. {NUMANodeAffinity: NewTestBitMask(3, 4), Preferred: false},
  310. },
  311. "resource-2/B": {
  312. {NUMANodeAffinity: NewTestBitMask(2), Preferred: true},
  313. {NUMANodeAffinity: NewTestBitMask(3, 4), Preferred: false},
  314. },
  315. },
  316. {
  317. "resource-3": nil,
  318. },
  319. },
  320. },
  321. }
  322. for _, tc := range tcases {
  323. mngr := manager{}
  324. mngr.policy = &mockPolicy{}
  325. mngr.hintProviders = tc.hp
  326. mngr.calculateAffinity(&v1.Pod{}, &v1.Container{})
  327. actual := mngr.policy.(*mockPolicy).ph
  328. if !reflect.DeepEqual(tc.expected, actual) {
  329. t.Errorf("Test Case: %s", tc.name)
  330. t.Errorf("Expected result to be %v, got %v", tc.expected, actual)
  331. }
  332. }
  333. }
  334. func TestAddContainer(t *testing.T) {
  335. testCases := []struct {
  336. name string
  337. containerID string
  338. podUID types.UID
  339. }{
  340. {
  341. name: "Case1",
  342. containerID: "nginx",
  343. podUID: "0aafa4c4-38e8-11e9-bcb1-a4bf01040474",
  344. },
  345. {
  346. name: "Case2",
  347. containerID: "Busy_Box",
  348. podUID: "b3ee37fc-39a5-11e9-bcb1-a4bf01040474",
  349. },
  350. }
  351. mngr := manager{}
  352. mngr.podMap = make(map[string]string)
  353. for _, tc := range testCases {
  354. pod := v1.Pod{}
  355. pod.UID = tc.podUID
  356. err := mngr.AddContainer(&pod, tc.containerID)
  357. if err != nil {
  358. t.Errorf("Expected error to be nil but got: %v", err)
  359. }
  360. if val, ok := mngr.podMap[tc.containerID]; ok {
  361. if reflect.DeepEqual(val, pod.UID) {
  362. t.Errorf("Error occurred")
  363. }
  364. } else {
  365. t.Errorf("Error occurred, Pod not added to podMap")
  366. }
  367. }
  368. }
  369. func TestRemoveContainer(t *testing.T) {
  370. testCases := []struct {
  371. name string
  372. containerID string
  373. podUID types.UID
  374. }{
  375. {
  376. name: "Case1",
  377. containerID: "nginx",
  378. podUID: "0aafa4c4-38e8-11e9-bcb1-a4bf01040474",
  379. },
  380. {
  381. name: "Case2",
  382. containerID: "Busy_Box",
  383. podUID: "b3ee37fc-39a5-11e9-bcb1-a4bf01040474",
  384. },
  385. }
  386. var len1, len2 int
  387. mngr := manager{}
  388. mngr.podMap = make(map[string]string)
  389. for _, tc := range testCases {
  390. mngr.podMap[tc.containerID] = string(tc.podUID)
  391. len1 = len(mngr.podMap)
  392. err := mngr.RemoveContainer(tc.containerID)
  393. len2 = len(mngr.podMap)
  394. if err != nil {
  395. t.Errorf("Expected error to be nil but got: %v", err)
  396. }
  397. if len1-len2 != 1 {
  398. t.Errorf("Remove Pod resulted in error")
  399. }
  400. }
  401. }
  402. func TestAddHintProvider(t *testing.T) {
  403. var len1 int
  404. tcases := []struct {
  405. name string
  406. hp []HintProvider
  407. }{
  408. {
  409. name: "Add HintProvider",
  410. hp: []HintProvider{
  411. &mockHintProvider{},
  412. },
  413. },
  414. }
  415. mngr := manager{}
  416. for _, tc := range tcases {
  417. mngr.hintProviders = []HintProvider{}
  418. len1 = len(mngr.hintProviders)
  419. mngr.AddHintProvider(tc.hp[0])
  420. }
  421. len2 := len(mngr.hintProviders)
  422. if len2-len1 != 1 {
  423. t.Errorf("error")
  424. }
  425. }
  426. func TestAdmit(t *testing.T) {
  427. numaNodes := []int{0, 1}
  428. tcases := []struct {
  429. name string
  430. result lifecycle.PodAdmitResult
  431. qosClass v1.PodQOSClass
  432. policy Policy
  433. hp []HintProvider
  434. expected bool
  435. }{
  436. {
  437. name: "QOSClass set as BestEffort. None Policy. No Hints.",
  438. qosClass: v1.PodQOSBestEffort,
  439. policy: NewNonePolicy(),
  440. hp: []HintProvider{},
  441. expected: true,
  442. },
  443. {
  444. name: "QOSClass set as Guaranteed. None Policy. No Hints.",
  445. qosClass: v1.PodQOSGuaranteed,
  446. policy: NewNonePolicy(),
  447. hp: []HintProvider{},
  448. expected: true,
  449. },
  450. {
  451. name: "QOSClass set as BestEffort. single-numa-node Policy. No Hints.",
  452. qosClass: v1.PodQOSBestEffort,
  453. policy: NewRestrictedPolicy(numaNodes),
  454. hp: []HintProvider{
  455. &mockHintProvider{},
  456. },
  457. expected: true,
  458. },
  459. {
  460. name: "QOSClass set as BestEffort. Restricted Policy. No Hints.",
  461. qosClass: v1.PodQOSBestEffort,
  462. policy: NewRestrictedPolicy(numaNodes),
  463. hp: []HintProvider{
  464. &mockHintProvider{},
  465. },
  466. expected: true,
  467. },
  468. {
  469. name: "QOSClass set as Guaranteed. BestEffort Policy. Preferred Affinity.",
  470. qosClass: v1.PodQOSGuaranteed,
  471. policy: NewBestEffortPolicy(numaNodes),
  472. hp: []HintProvider{
  473. &mockHintProvider{
  474. map[string][]TopologyHint{
  475. "resource": {
  476. {
  477. NUMANodeAffinity: NewTestBitMask(0),
  478. Preferred: true,
  479. },
  480. {
  481. NUMANodeAffinity: NewTestBitMask(0, 1),
  482. Preferred: false,
  483. },
  484. },
  485. },
  486. },
  487. },
  488. expected: true,
  489. },
  490. {
  491. name: "QOSClass set as Guaranteed. BestEffort Policy. More than one Preferred Affinity.",
  492. qosClass: v1.PodQOSGuaranteed,
  493. policy: NewBestEffortPolicy(numaNodes),
  494. hp: []HintProvider{
  495. &mockHintProvider{
  496. map[string][]TopologyHint{
  497. "resource": {
  498. {
  499. NUMANodeAffinity: NewTestBitMask(0),
  500. Preferred: true,
  501. },
  502. {
  503. NUMANodeAffinity: NewTestBitMask(1),
  504. Preferred: true,
  505. },
  506. {
  507. NUMANodeAffinity: NewTestBitMask(0, 1),
  508. Preferred: false,
  509. },
  510. },
  511. },
  512. },
  513. },
  514. expected: true,
  515. },
  516. {
  517. name: "QOSClass set as Burstable. BestEffort Policy. More than one Preferred Affinity.",
  518. qosClass: v1.PodQOSBurstable,
  519. policy: NewBestEffortPolicy(numaNodes),
  520. hp: []HintProvider{
  521. &mockHintProvider{
  522. map[string][]TopologyHint{
  523. "resource": {
  524. {
  525. NUMANodeAffinity: NewTestBitMask(0),
  526. Preferred: true,
  527. },
  528. {
  529. NUMANodeAffinity: NewTestBitMask(1),
  530. Preferred: true,
  531. },
  532. {
  533. NUMANodeAffinity: NewTestBitMask(0, 1),
  534. Preferred: false,
  535. },
  536. },
  537. },
  538. },
  539. },
  540. expected: true,
  541. },
  542. {
  543. name: "QOSClass set as Guaranteed. BestEffort Policy. No Preferred Affinity.",
  544. qosClass: v1.PodQOSGuaranteed,
  545. policy: NewBestEffortPolicy(numaNodes),
  546. hp: []HintProvider{
  547. &mockHintProvider{
  548. map[string][]TopologyHint{
  549. "resource": {
  550. {
  551. NUMANodeAffinity: NewTestBitMask(0, 1),
  552. Preferred: false,
  553. },
  554. },
  555. },
  556. },
  557. },
  558. expected: true,
  559. },
  560. {
  561. name: "QOSClass set as Guaranteed. Restricted Policy. Preferred Affinity.",
  562. qosClass: v1.PodQOSGuaranteed,
  563. policy: NewRestrictedPolicy(numaNodes),
  564. hp: []HintProvider{
  565. &mockHintProvider{
  566. map[string][]TopologyHint{
  567. "resource": {
  568. {
  569. NUMANodeAffinity: NewTestBitMask(0),
  570. Preferred: true,
  571. },
  572. {
  573. NUMANodeAffinity: NewTestBitMask(0, 1),
  574. Preferred: false,
  575. },
  576. },
  577. },
  578. },
  579. },
  580. expected: true,
  581. },
  582. {
  583. name: "QOSClass set as Burstable. Restricted Policy. Preferred Affinity.",
  584. qosClass: v1.PodQOSBurstable,
  585. policy: NewRestrictedPolicy(numaNodes),
  586. hp: []HintProvider{
  587. &mockHintProvider{
  588. map[string][]TopologyHint{
  589. "resource": {
  590. {
  591. NUMANodeAffinity: NewTestBitMask(0),
  592. Preferred: true,
  593. },
  594. {
  595. NUMANodeAffinity: NewTestBitMask(0, 1),
  596. Preferred: false,
  597. },
  598. },
  599. },
  600. },
  601. },
  602. expected: true,
  603. },
  604. {
  605. name: "QOSClass set as Guaranteed. Restricted Policy. More than one Preferred affinity.",
  606. qosClass: v1.PodQOSGuaranteed,
  607. policy: NewRestrictedPolicy(numaNodes),
  608. hp: []HintProvider{
  609. &mockHintProvider{
  610. map[string][]TopologyHint{
  611. "resource": {
  612. {
  613. NUMANodeAffinity: NewTestBitMask(0),
  614. Preferred: true,
  615. },
  616. {
  617. NUMANodeAffinity: NewTestBitMask(1),
  618. Preferred: true,
  619. },
  620. {
  621. NUMANodeAffinity: NewTestBitMask(0, 1),
  622. Preferred: false,
  623. },
  624. },
  625. },
  626. },
  627. },
  628. expected: true,
  629. },
  630. {
  631. name: "QOSClass set as Burstable. Restricted Policy. More than one Preferred affinity.",
  632. qosClass: v1.PodQOSBurstable,
  633. policy: NewRestrictedPolicy(numaNodes),
  634. hp: []HintProvider{
  635. &mockHintProvider{
  636. map[string][]TopologyHint{
  637. "resource": {
  638. {
  639. NUMANodeAffinity: NewTestBitMask(0),
  640. Preferred: true,
  641. },
  642. {
  643. NUMANodeAffinity: NewTestBitMask(1),
  644. Preferred: true,
  645. },
  646. {
  647. NUMANodeAffinity: NewTestBitMask(0, 1),
  648. Preferred: false,
  649. },
  650. },
  651. },
  652. },
  653. },
  654. expected: true,
  655. },
  656. {
  657. name: "QOSClass set as Guaranteed. Restricted Policy. No Preferred affinity.",
  658. qosClass: v1.PodQOSGuaranteed,
  659. policy: NewRestrictedPolicy(numaNodes),
  660. hp: []HintProvider{
  661. &mockHintProvider{
  662. map[string][]TopologyHint{
  663. "resource": {
  664. {
  665. NUMANodeAffinity: NewTestBitMask(0, 1),
  666. Preferred: false,
  667. },
  668. },
  669. },
  670. },
  671. },
  672. expected: false,
  673. },
  674. {
  675. name: "QOSClass set as Burstable. Restricted Policy. No Preferred affinity.",
  676. qosClass: v1.PodQOSBurstable,
  677. policy: NewRestrictedPolicy(numaNodes),
  678. hp: []HintProvider{
  679. &mockHintProvider{
  680. map[string][]TopologyHint{
  681. "resource": {
  682. {
  683. NUMANodeAffinity: NewTestBitMask(0, 1),
  684. Preferred: false,
  685. },
  686. },
  687. },
  688. },
  689. },
  690. expected: false,
  691. },
  692. }
  693. for _, tc := range tcases {
  694. man := manager{
  695. policy: tc.policy,
  696. podTopologyHints: make(map[string]map[string]TopologyHint),
  697. hintProviders: tc.hp,
  698. }
  699. pod := &v1.Pod{
  700. Spec: v1.PodSpec{
  701. Containers: []v1.Container{
  702. {
  703. Resources: v1.ResourceRequirements{},
  704. },
  705. },
  706. },
  707. Status: v1.PodStatus{
  708. QOSClass: tc.qosClass,
  709. },
  710. }
  711. podAttr := lifecycle.PodAdmitAttributes{
  712. Pod: pod,
  713. }
  714. actual := man.Admit(&podAttr)
  715. if actual.Admit != tc.expected {
  716. t.Errorf("Error occurred, expected Admit in result to be %v got %v", tc.expected, actual.Admit)
  717. }
  718. }
  719. }