mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-26 21:17:23 +00:00
Move common tests from topologymanager under scope
Signed-off-by: Krzysztof Wiatrzyk <k.wiatrzyk@samsung.com>
This commit is contained in:
parent
f5c0fe4ef6
commit
c786c9a533
118
pkg/kubelet/cm/topologymanager/scope_test.go
Normal file
118
pkg/kubelet/cm/topologymanager/scope_test.go
Normal file
@ -0,0 +1,118 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2020 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package topologymanager
|
||||||
|
|
||||||
|
import (
|
||||||
|
"k8s.io/api/core/v1"
|
||||||
|
"k8s.io/apimachinery/pkg/types"
|
||||||
|
"reflect"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestGetAffinity(t *testing.T) {
|
||||||
|
tcases := []struct {
|
||||||
|
name string
|
||||||
|
containerName string
|
||||||
|
podUID string
|
||||||
|
expected TopologyHint
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "case1",
|
||||||
|
containerName: "nginx",
|
||||||
|
podUID: "0aafa4c4-38e8-11e9-bcb1-a4bf01040474",
|
||||||
|
expected: TopologyHint{},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, tc := range tcases {
|
||||||
|
scope := scope{}
|
||||||
|
actual := scope.GetAffinity(tc.podUID, tc.containerName)
|
||||||
|
if !reflect.DeepEqual(actual, tc.expected) {
|
||||||
|
t.Errorf("Expected Affinity in result to be %v, got %v", tc.expected, actual)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestAddContainer(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
name string
|
||||||
|
containerID string
|
||||||
|
podUID types.UID
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "Case1",
|
||||||
|
containerID: "nginx",
|
||||||
|
podUID: "0aafa4c4-38e8-11e9-bcb1-a4bf01040474",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Case2",
|
||||||
|
containerID: "Busy_Box",
|
||||||
|
podUID: "b3ee37fc-39a5-11e9-bcb1-a4bf01040474",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
scope := scope{}
|
||||||
|
scope.podMap = make(map[string]string)
|
||||||
|
for _, tc := range testCases {
|
||||||
|
pod := v1.Pod{}
|
||||||
|
pod.UID = tc.podUID
|
||||||
|
err := scope.AddContainer(&pod, tc.containerID)
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("Expected error to be nil but got: %v", err)
|
||||||
|
}
|
||||||
|
if val, ok := scope.podMap[tc.containerID]; ok {
|
||||||
|
if reflect.DeepEqual(val, pod.UID) {
|
||||||
|
t.Errorf("Error occurred")
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
t.Errorf("Error occurred, Pod not added to podMap")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestRemoveContainer(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
name string
|
||||||
|
containerID string
|
||||||
|
podUID types.UID
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "Case1",
|
||||||
|
containerID: "nginx",
|
||||||
|
podUID: "0aafa4c4-38e8-11e9-bcb1-a4bf01040474",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Case2",
|
||||||
|
containerID: "Busy_Box",
|
||||||
|
podUID: "b3ee37fc-39a5-11e9-bcb1-a4bf01040474",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
var len1, len2 int
|
||||||
|
scope := scope{}
|
||||||
|
scope.podMap = make(map[string]string)
|
||||||
|
for _, tc := range testCases {
|
||||||
|
scope.podMap[tc.containerID] = string(tc.podUID)
|
||||||
|
len1 = len(scope.podMap)
|
||||||
|
err := scope.RemoveContainer(tc.containerID)
|
||||||
|
len2 = len(scope.podMap)
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("Expected error to be nil but got: %v", err)
|
||||||
|
}
|
||||||
|
if len1-len2 != 1 {
|
||||||
|
t.Errorf("Remove Pod resulted in error")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@ -23,7 +23,6 @@ import (
|
|||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"k8s.io/api/core/v1"
|
"k8s.io/api/core/v1"
|
||||||
"k8s.io/apimachinery/pkg/types"
|
|
||||||
"k8s.io/kubernetes/pkg/kubelet/cm/topologymanager/bitmask"
|
"k8s.io/kubernetes/pkg/kubelet/cm/topologymanager/bitmask"
|
||||||
"k8s.io/kubernetes/pkg/kubelet/lifecycle"
|
"k8s.io/kubernetes/pkg/kubelet/lifecycle"
|
||||||
)
|
)
|
||||||
@ -144,29 +143,6 @@ func (m *mockHintProvider) Allocate(pod *v1.Pod, container *v1.Container) error
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestGetAffinity(t *testing.T) {
|
|
||||||
tcases := []struct {
|
|
||||||
name string
|
|
||||||
containerName string
|
|
||||||
podUID string
|
|
||||||
expected TopologyHint
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
name: "case1",
|
|
||||||
containerName: "nginx",
|
|
||||||
podUID: "0aafa4c4-38e8-11e9-bcb1-a4bf01040474",
|
|
||||||
expected: TopologyHint{},
|
|
||||||
},
|
|
||||||
}
|
|
||||||
for _, tc := range tcases {
|
|
||||||
mngr := manager{}
|
|
||||||
actual := mngr.GetAffinity(tc.podUID, tc.containerName)
|
|
||||||
if !reflect.DeepEqual(actual, tc.expected) {
|
|
||||||
t.Errorf("Expected Affinity in result to be %v, got %v", tc.expected, actual)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestAccumulateProvidersHints(t *testing.T) {
|
func TestAccumulateProvidersHints(t *testing.T) {
|
||||||
tcases := []struct {
|
tcases := []struct {
|
||||||
name string
|
name string
|
||||||
@ -414,76 +390,6 @@ func TestCalculateAffinity(t *testing.T) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestAddContainer(t *testing.T) {
|
|
||||||
testCases := []struct {
|
|
||||||
name string
|
|
||||||
containerID string
|
|
||||||
podUID types.UID
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
name: "Case1",
|
|
||||||
containerID: "nginx",
|
|
||||||
podUID: "0aafa4c4-38e8-11e9-bcb1-a4bf01040474",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "Case2",
|
|
||||||
containerID: "Busy_Box",
|
|
||||||
podUID: "b3ee37fc-39a5-11e9-bcb1-a4bf01040474",
|
|
||||||
},
|
|
||||||
}
|
|
||||||
mngr := manager{}
|
|
||||||
mngr.podMap = make(map[string]string)
|
|
||||||
for _, tc := range testCases {
|
|
||||||
pod := v1.Pod{}
|
|
||||||
pod.UID = tc.podUID
|
|
||||||
err := mngr.AddContainer(&pod, tc.containerID)
|
|
||||||
if err != nil {
|
|
||||||
t.Errorf("Expected error to be nil but got: %v", err)
|
|
||||||
}
|
|
||||||
if val, ok := mngr.podMap[tc.containerID]; ok {
|
|
||||||
if reflect.DeepEqual(val, pod.UID) {
|
|
||||||
t.Errorf("Error occurred")
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
t.Errorf("Error occurred, Pod not added to podMap")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestRemoveContainer(t *testing.T) {
|
|
||||||
testCases := []struct {
|
|
||||||
name string
|
|
||||||
containerID string
|
|
||||||
podUID types.UID
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
name: "Case1",
|
|
||||||
containerID: "nginx",
|
|
||||||
podUID: "0aafa4c4-38e8-11e9-bcb1-a4bf01040474",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "Case2",
|
|
||||||
containerID: "Busy_Box",
|
|
||||||
podUID: "b3ee37fc-39a5-11e9-bcb1-a4bf01040474",
|
|
||||||
},
|
|
||||||
}
|
|
||||||
var len1, len2 int
|
|
||||||
mngr := manager{}
|
|
||||||
mngr.podMap = make(map[string]string)
|
|
||||||
for _, tc := range testCases {
|
|
||||||
mngr.podMap[tc.containerID] = string(tc.podUID)
|
|
||||||
len1 = len(mngr.podMap)
|
|
||||||
err := mngr.RemoveContainer(tc.containerID)
|
|
||||||
len2 = len(mngr.podMap)
|
|
||||||
if err != nil {
|
|
||||||
t.Errorf("Expected error to be nil but got: %v", err)
|
|
||||||
}
|
|
||||||
if len1-len2 != 1 {
|
|
||||||
t.Errorf("Remove Pod resulted in error")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
func TestAddHintProvider(t *testing.T) {
|
func TestAddHintProvider(t *testing.T) {
|
||||||
tcases := []struct {
|
tcases := []struct {
|
||||||
name string
|
name string
|
||||||
|
Loading…
Reference in New Issue
Block a user