strategy_test.go 8.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360
  1. /*
  2. Copyright 2019 The Kubernetes Authors.
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package csinode
  14. import (
  15. "reflect"
  16. "testing"
  17. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  18. "k8s.io/apimachinery/pkg/util/validation/field"
  19. genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
  20. "k8s.io/kubernetes/pkg/apis/storage"
  21. utilpointer "k8s.io/utils/pointer"
  22. )
  23. func TestPrepareForCreate(t *testing.T) {
  24. valid := getValidCSINode("foo")
  25. emptyAllocatable := &storage.CSINode{
  26. ObjectMeta: metav1.ObjectMeta{
  27. Name: "foo",
  28. },
  29. Spec: storage.CSINodeSpec{
  30. Drivers: []storage.CSINodeDriver{
  31. {
  32. Name: "valid-driver-name",
  33. NodeID: "valid-node",
  34. TopologyKeys: []string{"company.com/zone1", "company.com/zone2"},
  35. },
  36. },
  37. },
  38. }
  39. volumeLimitsCases := []struct {
  40. name string
  41. obj *storage.CSINode
  42. expected *storage.CSINode
  43. }{
  44. {
  45. "empty allocatable",
  46. emptyAllocatable,
  47. emptyAllocatable,
  48. },
  49. {
  50. "valid allocatable",
  51. valid,
  52. valid,
  53. },
  54. }
  55. for _, test := range volumeLimitsCases {
  56. t.Run(test.name, func(t *testing.T) {
  57. testPrepareForCreate(t, test.obj, test.expected)
  58. })
  59. }
  60. }
  61. func testPrepareForCreate(t *testing.T, obj, expected *storage.CSINode) {
  62. ctx := genericapirequest.WithRequestInfo(genericapirequest.NewContext(), &genericapirequest.RequestInfo{
  63. APIGroup: "storage.k8s.io",
  64. APIVersion: "v1beta1",
  65. Resource: "csinodes",
  66. })
  67. Strategy.PrepareForCreate(ctx, obj)
  68. if !reflect.DeepEqual(*expected, *obj) {
  69. t.Errorf("Object mismatch! Expected:\n%#v\ngot:\n%#v", *expected, *obj)
  70. }
  71. }
  72. func TestPrepareForUpdate(t *testing.T) {
  73. valid := getValidCSINode("foo")
  74. differentAllocatable := &storage.CSINode{
  75. ObjectMeta: metav1.ObjectMeta{
  76. Name: "foo",
  77. },
  78. Spec: storage.CSINodeSpec{
  79. Drivers: []storage.CSINodeDriver{
  80. {
  81. Name: "valid-driver-name",
  82. NodeID: "valid-node",
  83. TopologyKeys: []string{"company.com/zone1", "company.com/zone2"},
  84. Allocatable: &storage.VolumeNodeResources{Count: utilpointer.Int32Ptr(20)},
  85. },
  86. },
  87. },
  88. }
  89. emptyAllocatable := &storage.CSINode{
  90. ObjectMeta: metav1.ObjectMeta{
  91. Name: "foo",
  92. },
  93. Spec: storage.CSINodeSpec{
  94. Drivers: []storage.CSINodeDriver{
  95. {
  96. Name: "valid-driver-name",
  97. NodeID: "valid-node",
  98. TopologyKeys: []string{"company.com/zone1", "company.com/zone2"},
  99. },
  100. },
  101. },
  102. }
  103. volumeLimitsCases := []struct {
  104. name string
  105. old *storage.CSINode
  106. new *storage.CSINode
  107. expected *storage.CSINode
  108. }{
  109. {
  110. "allow empty allocatable when it's not set",
  111. emptyAllocatable,
  112. emptyAllocatable,
  113. emptyAllocatable,
  114. },
  115. {
  116. "allow valid allocatable when it's already set",
  117. valid,
  118. differentAllocatable,
  119. differentAllocatable,
  120. },
  121. {
  122. "allow valid allocatable when it's not set",
  123. emptyAllocatable,
  124. valid,
  125. valid,
  126. },
  127. }
  128. for _, test := range volumeLimitsCases {
  129. t.Run(test.name, func(t *testing.T) {
  130. testPrepareForUpdate(t, test.new, test.old, test.expected)
  131. })
  132. }
  133. }
  134. func testPrepareForUpdate(t *testing.T, obj, old, expected *storage.CSINode) {
  135. ctx := genericapirequest.WithRequestInfo(genericapirequest.NewContext(), &genericapirequest.RequestInfo{
  136. APIGroup: "storage.k8s.io",
  137. APIVersion: "v1beta1",
  138. Resource: "csinodes",
  139. })
  140. Strategy.PrepareForUpdate(ctx, obj, old)
  141. if !reflect.DeepEqual(*expected, *obj) {
  142. t.Errorf("Object mismatch! Expected:\n%#v\ngot:\n%#v", *expected, *obj)
  143. }
  144. }
  145. func TestCSINodeStrategy(t *testing.T) {
  146. ctx := genericapirequest.WithRequestInfo(genericapirequest.NewContext(), &genericapirequest.RequestInfo{
  147. APIGroup: "storage.k8s.io",
  148. APIVersion: "v1beta1",
  149. Resource: "csinodes",
  150. })
  151. if Strategy.NamespaceScoped() {
  152. t.Errorf("CSINode must not be namespace scoped")
  153. }
  154. if Strategy.AllowCreateOnUpdate() {
  155. t.Errorf("CSINode should not allow create on update")
  156. }
  157. csiNode := getValidCSINode("valid-csinode")
  158. Strategy.PrepareForCreate(ctx, csiNode)
  159. errs := Strategy.Validate(ctx, csiNode)
  160. if len(errs) != 0 {
  161. t.Errorf("unexpected error validating %v", errs)
  162. }
  163. // Update of spec is allowed
  164. newCSINode := csiNode.DeepCopy()
  165. newCSINode.Spec.Drivers[0].NodeID = "valid-node-2"
  166. Strategy.PrepareForUpdate(ctx, newCSINode, csiNode)
  167. errs = Strategy.ValidateUpdate(ctx, newCSINode, csiNode)
  168. if len(errs) == 0 {
  169. t.Errorf("expected validation error")
  170. }
  171. }
  172. func TestCSINodeValidation(t *testing.T) {
  173. tests := []struct {
  174. name string
  175. csiNode *storage.CSINode
  176. expectError bool
  177. }{
  178. {
  179. "valid csinode",
  180. getValidCSINode("foo"),
  181. false,
  182. },
  183. {
  184. "valid csinode with empty allocatable",
  185. &storage.CSINode{
  186. ObjectMeta: metav1.ObjectMeta{
  187. Name: "foo",
  188. },
  189. Spec: storage.CSINodeSpec{
  190. Drivers: []storage.CSINodeDriver{
  191. {
  192. Name: "valid-driver-name",
  193. NodeID: "valid-node",
  194. TopologyKeys: []string{"company.com/zone1", "company.com/zone2"},
  195. },
  196. },
  197. },
  198. },
  199. false,
  200. },
  201. {
  202. "valid csinode with missing volume limits",
  203. &storage.CSINode{
  204. ObjectMeta: metav1.ObjectMeta{
  205. Name: "foo",
  206. },
  207. Spec: storage.CSINodeSpec{
  208. Drivers: []storage.CSINodeDriver{
  209. {
  210. Name: "valid-driver-name",
  211. NodeID: "valid-node",
  212. TopologyKeys: []string{"company.com/zone1", "company.com/zone2"},
  213. Allocatable: &storage.VolumeNodeResources{Count: nil},
  214. },
  215. },
  216. },
  217. },
  218. false,
  219. },
  220. {
  221. "invalid driver name",
  222. &storage.CSINode{
  223. ObjectMeta: metav1.ObjectMeta{
  224. Name: "foo",
  225. },
  226. Spec: storage.CSINodeSpec{
  227. Drivers: []storage.CSINodeDriver{
  228. {
  229. Name: "$csi-driver@",
  230. NodeID: "valid-node",
  231. TopologyKeys: []string{"company.com/zone1", "company.com/zone2"},
  232. Allocatable: &storage.VolumeNodeResources{Count: utilpointer.Int32Ptr(10)},
  233. },
  234. },
  235. },
  236. },
  237. true,
  238. },
  239. {
  240. "empty node id",
  241. &storage.CSINode{
  242. ObjectMeta: metav1.ObjectMeta{
  243. Name: "foo",
  244. },
  245. Spec: storage.CSINodeSpec{
  246. Drivers: []storage.CSINodeDriver{
  247. {
  248. Name: "valid-driver-name",
  249. NodeID: "",
  250. TopologyKeys: []string{"company.com/zone1", "company.com/zone2"},
  251. Allocatable: &storage.VolumeNodeResources{Count: utilpointer.Int32Ptr(10)},
  252. },
  253. },
  254. },
  255. },
  256. true,
  257. },
  258. {
  259. "invalid allocatable with negative volumes limit",
  260. &storage.CSINode{
  261. ObjectMeta: metav1.ObjectMeta{
  262. Name: "foo",
  263. },
  264. Spec: storage.CSINodeSpec{
  265. Drivers: []storage.CSINodeDriver{
  266. {
  267. Name: "valid-driver-name",
  268. NodeID: "valid-node",
  269. TopologyKeys: []string{"company.com/zone1", "company.com/zone2"},
  270. Allocatable: &storage.VolumeNodeResources{Count: utilpointer.Int32Ptr(-1)},
  271. },
  272. },
  273. },
  274. },
  275. true,
  276. },
  277. {
  278. "invalid topology keys",
  279. &storage.CSINode{
  280. ObjectMeta: metav1.ObjectMeta{
  281. Name: "foo",
  282. },
  283. Spec: storage.CSINodeSpec{
  284. Drivers: []storage.CSINodeDriver{
  285. {
  286. Name: "valid-driver-name",
  287. NodeID: "valid-node",
  288. TopologyKeys: []string{"company.com/zone1", ""},
  289. Allocatable: &storage.VolumeNodeResources{Count: utilpointer.Int32Ptr(10)},
  290. },
  291. },
  292. },
  293. },
  294. true,
  295. },
  296. }
  297. for _, test := range tests {
  298. t.Run(test.name, func(t *testing.T) {
  299. testValidation := func(csiNode *storage.CSINode, apiVersion string) field.ErrorList {
  300. ctx := genericapirequest.WithRequestInfo(genericapirequest.NewContext(), &genericapirequest.RequestInfo{
  301. APIGroup: "storage.k8s.io",
  302. APIVersion: "v1beta1",
  303. Resource: "csinodes",
  304. })
  305. return Strategy.Validate(ctx, csiNode)
  306. }
  307. betaErr := testValidation(test.csiNode, "v1beta1")
  308. if len(betaErr) > 0 && !test.expectError {
  309. t.Errorf("Validation of v1beta1 object failed: %+v", betaErr)
  310. }
  311. if len(betaErr) == 0 && test.expectError {
  312. t.Errorf("Validation of v1beta1 object unexpectedly succeeded")
  313. }
  314. })
  315. }
  316. }
  317. func getValidCSINode(name string) *storage.CSINode {
  318. return &storage.CSINode{
  319. ObjectMeta: metav1.ObjectMeta{
  320. Name: name,
  321. },
  322. Spec: storage.CSINodeSpec{
  323. Drivers: []storage.CSINodeDriver{
  324. {
  325. Name: "valid-driver-name",
  326. NodeID: "valid-node",
  327. TopologyKeys: []string{"company.com/zone1", "company.com/zone2"},
  328. Allocatable: &storage.VolumeNodeResources{Count: utilpointer.Int32Ptr(10)},
  329. },
  330. },
  331. },
  332. }
  333. }