mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-10-31 13:50:01 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			923 lines
		
	
	
		
			28 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			923 lines
		
	
	
		
			28 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2017 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package scheduler
 | |
| 
 | |
| import (
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	"k8s.io/api/core/v1"
 | |
| 	"k8s.io/apimachinery/pkg/api/errors"
 | |
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | |
| 	"k8s.io/apimachinery/pkg/util/wait"
 | |
| 	testutils "k8s.io/kubernetes/test/utils"
 | |
| 	imageutils "k8s.io/kubernetes/test/utils/image"
 | |
| )
 | |
| 
 | |
| // This file tests the scheduler predicates functionality.
 | |
| 
 | |
| const pollInterval = 100 * time.Millisecond
 | |
| 
 | |
| // TestInterPodAffinity verifies that scheduler's inter pod affinity and
 | |
| // anti-affinity predicate functions works correctly.
 | |
| func TestInterPodAffinity(t *testing.T) {
 | |
| 	context := initTest(t, "inter-pod-affinity")
 | |
| 	defer cleanupTest(t, context)
 | |
| 	// Add a few nodes.
 | |
| 	nodes, err := createNodes(context.clientSet, "testnode", nil, 2)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Cannot create nodes: %v", err)
 | |
| 	}
 | |
| 	// Add labels to the nodes.
 | |
| 	labels1 := map[string]string{
 | |
| 		"region": "r1",
 | |
| 		"zone":   "z11",
 | |
| 	}
 | |
| 	for _, node := range nodes {
 | |
| 		if err = testutils.AddLabelsToNode(context.clientSet, node.Name, labels1); err != nil {
 | |
| 			t.Fatalf("Cannot add labels to node: %v", err)
 | |
| 		}
 | |
| 		if err = waitForNodeLabels(context.clientSet, node.Name, labels1); err != nil {
 | |
| 			t.Fatalf("Adding labels to node didn't succeed: %v", err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	cs := context.clientSet
 | |
| 	podLabel := map[string]string{"service": "securityscan"}
 | |
| 	// podLabel2 := map[string]string{"security": "S1"}
 | |
| 
 | |
| 	tests := []struct {
 | |
| 		pod       *v1.Pod
 | |
| 		pods      []*v1.Pod
 | |
| 		node      *v1.Node
 | |
| 		fits      bool
 | |
| 		errorType string
 | |
| 		test      string
 | |
| 	}{
 | |
| 		/*{
 | |
| 			pod: &v1.Pod{
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Name:   "fakename",
 | |
| 					Labels: podLabel2,
 | |
| 				},
 | |
| 				Spec: v1.PodSpec{
 | |
| 					Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 					Affinity: &v1.Affinity{
 | |
| 						PodAffinity: &v1.PodAffinity{
 | |
| 							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | |
| 								{
 | |
| 									LabelSelector: &metav1.LabelSelector{
 | |
| 										MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 											{
 | |
| 												Key:      "security",
 | |
| 												Operator: metav1.LabelSelectorOpDoesNotExist,
 | |
| 												Values:   []string{"securityscan"},
 | |
| 											},
 | |
| 										},
 | |
| 									},
 | |
| 									TopologyKey: "region",
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 			node:      nodes[0],
 | |
| 			fits:      false,
 | |
| 			errorType: "invalidPod",
 | |
| 			test:      "validates that a pod with an invalid podAffinity is rejected because of the LabelSelectorRequirement is invalid",
 | |
| 		},
 | |
| 		{
 | |
| 			pod: &v1.Pod{
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Name:   "fakename",
 | |
| 					Labels: podLabel2,
 | |
| 				},
 | |
| 				Spec: v1.PodSpec{
 | |
| 					Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 					Affinity: &v1.Affinity{
 | |
| 						PodAffinity: &v1.PodAffinity{
 | |
| 							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | |
| 								{
 | |
| 									LabelSelector: &metav1.LabelSelector{
 | |
| 										MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 											{
 | |
| 												Key:      "security",
 | |
| 												Operator: metav1.LabelSelectorOpIn,
 | |
| 												Values:   []string{"securityscan"},
 | |
| 											},
 | |
| 										},
 | |
| 									},
 | |
| 									TopologyKey: "region",
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 			node: nodes[0],
 | |
| 			fits: false,
 | |
| 			test: "validates that Inter-pod-Affinity is respected if not matching",
 | |
| 		},
 | |
| 		{
 | |
| 			pod: &v1.Pod{
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Name:   "fakename",
 | |
| 					Labels: podLabel2,
 | |
| 				},
 | |
| 				Spec: v1.PodSpec{
 | |
| 					Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 					Affinity: &v1.Affinity{
 | |
| 						PodAffinity: &v1.PodAffinity{
 | |
| 							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | |
| 								{
 | |
| 									LabelSelector: &metav1.LabelSelector{
 | |
| 										MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 											{
 | |
| 												Key:      "service",
 | |
| 												Operator: metav1.LabelSelectorOpIn,
 | |
| 												Values:   []string{"securityscan", "value2"},
 | |
| 											},
 | |
| 										},
 | |
| 									},
 | |
| 									TopologyKey: "region",
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 			pods: []*v1.Pod{{
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Name:   "fakename2",
 | |
| 					Labels: podLabel,
 | |
| 				},
 | |
| 				Spec: v1.PodSpec{
 | |
| 					Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 					NodeName:   nodes[0].Name,
 | |
| 				},
 | |
| 			},
 | |
| 			},
 | |
| 			node: nodes[0],
 | |
| 			fits: true,
 | |
| 			test: "validates that InterPodAffinity is respected if matching. requiredDuringSchedulingIgnoredDuringExecution in PodAffinity using In operator that matches the existing pod",
 | |
| 		},
 | |
| 		{
 | |
| 			pod: &v1.Pod{
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Name:   "fakename",
 | |
| 					Labels: podLabel2,
 | |
| 				},
 | |
| 				Spec: v1.PodSpec{
 | |
| 					Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 					Affinity: &v1.Affinity{
 | |
| 						PodAffinity: &v1.PodAffinity{
 | |
| 							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | |
| 								{
 | |
| 									LabelSelector: &metav1.LabelSelector{
 | |
| 										MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 											{
 | |
| 												Key:      "service",
 | |
| 												Operator: metav1.LabelSelectorOpNotIn,
 | |
| 												Values:   []string{"securityscan3", "value3"},
 | |
| 											},
 | |
| 										},
 | |
| 									},
 | |
| 									TopologyKey: "region",
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 			pods: []*v1.Pod{{Spec: v1.PodSpec{
 | |
| 				Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 				NodeName:   nodes[0].Name},
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Name:   "fakename2",
 | |
| 					Labels: podLabel}}},
 | |
| 			node: nodes[0],
 | |
| 			fits: true,
 | |
| 			test: "validates that InterPodAffinity is respected if matching. requiredDuringSchedulingIgnoredDuringExecution in PodAffinity using not in operator in labelSelector that matches the existing pod",
 | |
| 		},
 | |
| 		{
 | |
| 			pod: &v1.Pod{
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Name:   "fakename",
 | |
| 					Labels: podLabel2,
 | |
| 				},
 | |
| 				Spec: v1.PodSpec{
 | |
| 					Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 					Affinity: &v1.Affinity{
 | |
| 						PodAffinity: &v1.PodAffinity{
 | |
| 							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | |
| 								{
 | |
| 									LabelSelector: &metav1.LabelSelector{
 | |
| 										MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 											{
 | |
| 												Key:      "service",
 | |
| 												Operator: metav1.LabelSelectorOpIn,
 | |
| 												Values:   []string{"securityscan", "value2"},
 | |
| 											},
 | |
| 										},
 | |
| 									},
 | |
| 									TopologyKey: "region",
 | |
| 									Namespaces:  []string{"diff-namespace"},
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 			pods: []*v1.Pod{{Spec: v1.PodSpec{
 | |
| 				Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 				NodeName:   nodes[0].Name},
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Name:   "fakename2",
 | |
| 					Labels: podLabel, Namespace: "ns"}}},
 | |
| 			node: nodes[0],
 | |
| 			fits: false,
 | |
| 			test: "validates that inter-pod-affinity is respected when pods have different Namespaces",
 | |
| 		},
 | |
| 		{
 | |
| 			pod: &v1.Pod{
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Name:   "fakename",
 | |
| 					Labels: podLabel,
 | |
| 				},
 | |
| 				Spec: v1.PodSpec{
 | |
| 					Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 					Affinity: &v1.Affinity{
 | |
| 						PodAffinity: &v1.PodAffinity{
 | |
| 							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | |
| 								{
 | |
| 									LabelSelector: &metav1.LabelSelector{
 | |
| 										MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 											{
 | |
| 												Key:      "service",
 | |
| 												Operator: metav1.LabelSelectorOpIn,
 | |
| 												Values:   []string{"antivirusscan", "value2"},
 | |
| 											},
 | |
| 										},
 | |
| 									},
 | |
| 									TopologyKey: "region",
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 			pods: []*v1.Pod{{Spec: v1.PodSpec{
 | |
| 				Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 				NodeName:   nodes[0].Name}, ObjectMeta: metav1.ObjectMeta{
 | |
| 				Name:   "fakename2",
 | |
| 				Labels: podLabel}}},
 | |
| 			node: nodes[0],
 | |
| 			fits: false,
 | |
| 			test: "Doesn't satisfy the PodAffinity because of unmatching labelSelector with the existing pod",
 | |
| 		},
 | |
| 		{
 | |
| 			pod: &v1.Pod{
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Name:   "fakename",
 | |
| 					Labels: podLabel2,
 | |
| 				},
 | |
| 				Spec: v1.PodSpec{
 | |
| 					Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 					Affinity: &v1.Affinity{
 | |
| 						PodAffinity: &v1.PodAffinity{
 | |
| 							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | |
| 								{
 | |
| 									LabelSelector: &metav1.LabelSelector{
 | |
| 										MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 											{
 | |
| 												Key:      "service",
 | |
| 												Operator: metav1.LabelSelectorOpExists,
 | |
| 											}, {
 | |
| 												Key:      "wrongkey",
 | |
| 												Operator: metav1.LabelSelectorOpDoesNotExist,
 | |
| 											},
 | |
| 										},
 | |
| 									},
 | |
| 									TopologyKey: "region",
 | |
| 								}, {
 | |
| 									LabelSelector: &metav1.LabelSelector{
 | |
| 										MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 											{
 | |
| 												Key:      "service",
 | |
| 												Operator: metav1.LabelSelectorOpIn,
 | |
| 												Values:   []string{"securityscan"},
 | |
| 											}, {
 | |
| 												Key:      "service",
 | |
| 												Operator: metav1.LabelSelectorOpNotIn,
 | |
| 												Values:   []string{"WrongValue"},
 | |
| 											},
 | |
| 										},
 | |
| 									},
 | |
| 									TopologyKey: "region",
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 			pods: []*v1.Pod{{Spec: v1.PodSpec{
 | |
| 				Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 				NodeName:   nodes[0].Name}, ObjectMeta: metav1.ObjectMeta{
 | |
| 				Name:   "fakename2",
 | |
| 				Labels: podLabel}}},
 | |
| 			node: nodes[0],
 | |
| 			fits: true,
 | |
| 			test: "validates that InterPodAffinity is respected if matching with multiple affinities in multiple RequiredDuringSchedulingIgnoredDuringExecution ",
 | |
| 		},
 | |
| 		{
 | |
| 			pod: &v1.Pod{
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Labels: podLabel2,
 | |
| 					Name:   "fakename",
 | |
| 				},
 | |
| 				Spec: v1.PodSpec{
 | |
| 					Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 					Affinity: &v1.Affinity{
 | |
| 						PodAffinity: &v1.PodAffinity{
 | |
| 							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | |
| 								{
 | |
| 									LabelSelector: &metav1.LabelSelector{
 | |
| 										MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 											{
 | |
| 												Key:      "service",
 | |
| 												Operator: metav1.LabelSelectorOpExists,
 | |
| 											}, {
 | |
| 												Key:      "wrongkey",
 | |
| 												Operator: metav1.LabelSelectorOpDoesNotExist,
 | |
| 											},
 | |
| 										},
 | |
| 									},
 | |
| 									TopologyKey: "region",
 | |
| 								}, {
 | |
| 									LabelSelector: &metav1.LabelSelector{
 | |
| 										MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 											{
 | |
| 												Key:      "service",
 | |
| 												Operator: metav1.LabelSelectorOpIn,
 | |
| 												Values:   []string{"securityscan2"},
 | |
| 											}, {
 | |
| 												Key:      "service",
 | |
| 												Operator: metav1.LabelSelectorOpNotIn,
 | |
| 												Values:   []string{"WrongValue"},
 | |
| 											},
 | |
| 										},
 | |
| 									},
 | |
| 									TopologyKey: "region",
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 			pods: []*v1.Pod{{Spec: v1.PodSpec{
 | |
| 				Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 				NodeName:   nodes[0].Name}, ObjectMeta: metav1.ObjectMeta{
 | |
| 				Name:   "fakename2",
 | |
| 				Labels: podLabel}}},
 | |
| 			node: nodes[0],
 | |
| 			fits: false,
 | |
| 			test: "The labelSelector requirements(items of matchExpressions) are ANDed, the pod cannot schedule onto the node because one of the matchExpression items doesn't match.",
 | |
| 		},
 | |
| 		{
 | |
| 			pod: &v1.Pod{
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Name:   "fakename",
 | |
| 					Labels: podLabel2,
 | |
| 				},
 | |
| 				Spec: v1.PodSpec{
 | |
| 					Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 					Affinity: &v1.Affinity{
 | |
| 						PodAffinity: &v1.PodAffinity{
 | |
| 							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | |
| 								{
 | |
| 									LabelSelector: &metav1.LabelSelector{
 | |
| 										MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 											{
 | |
| 												Key:      "service",
 | |
| 												Operator: metav1.LabelSelectorOpIn,
 | |
| 												Values:   []string{"securityscan", "value2"},
 | |
| 											},
 | |
| 										},
 | |
| 									},
 | |
| 									TopologyKey: "region",
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 						PodAntiAffinity: &v1.PodAntiAffinity{
 | |
| 							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | |
| 								{
 | |
| 									LabelSelector: &metav1.LabelSelector{
 | |
| 										MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 											{
 | |
| 												Key:      "service",
 | |
| 												Operator: metav1.LabelSelectorOpIn,
 | |
| 												Values:   []string{"antivirusscan", "value2"},
 | |
| 											},
 | |
| 										},
 | |
| 									},
 | |
| 									TopologyKey: "node",
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 			pods: []*v1.Pod{{Spec: v1.PodSpec{
 | |
| 				Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 				NodeName:   nodes[0].Name}, ObjectMeta: metav1.ObjectMeta{
 | |
| 				Name:   "fakename2",
 | |
| 				Labels: podLabel}}},
 | |
| 			node: nodes[0],
 | |
| 			fits: true,
 | |
| 			test: "validates that InterPod Affinity and AntiAffinity is respected if matching",
 | |
| 		},
 | |
| 		{
 | |
| 			pod: &v1.Pod{
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Name:   "fakename",
 | |
| 					Labels: podLabel2,
 | |
| 				},
 | |
| 				Spec: v1.PodSpec{
 | |
| 					Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 					Affinity: &v1.Affinity{
 | |
| 						PodAffinity: &v1.PodAffinity{
 | |
| 							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | |
| 								{
 | |
| 									LabelSelector: &metav1.LabelSelector{
 | |
| 										MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 											{
 | |
| 												Key:      "service",
 | |
| 												Operator: metav1.LabelSelectorOpIn,
 | |
| 												Values:   []string{"securityscan", "value2"},
 | |
| 											},
 | |
| 										},
 | |
| 									},
 | |
| 									TopologyKey: "region",
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 						PodAntiAffinity: &v1.PodAntiAffinity{
 | |
| 							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | |
| 								{
 | |
| 									LabelSelector: &metav1.LabelSelector{
 | |
| 										MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 											{
 | |
| 												Key:      "service",
 | |
| 												Operator: metav1.LabelSelectorOpIn,
 | |
| 												Values:   []string{"antivirusscan", "value2"},
 | |
| 											},
 | |
| 										},
 | |
| 									},
 | |
| 									TopologyKey: "node",
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 			pods: []*v1.Pod{
 | |
| 				{
 | |
| 					Spec: v1.PodSpec{
 | |
| 						Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 						NodeName:   nodes[0].Name,
 | |
| 						Affinity: &v1.Affinity{
 | |
| 							PodAntiAffinity: &v1.PodAntiAffinity{
 | |
| 								RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | |
| 									{
 | |
| 										LabelSelector: &metav1.LabelSelector{
 | |
| 											MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 												{
 | |
| 													Key:      "service",
 | |
| 													Operator: metav1.LabelSelectorOpIn,
 | |
| 													Values:   []string{"antivirusscan", "value2"},
 | |
| 												},
 | |
| 											},
 | |
| 										},
 | |
| 										TopologyKey: "node",
 | |
| 									},
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 					ObjectMeta: metav1.ObjectMeta{
 | |
| 						Name:   "fakename2",
 | |
| 						Labels: podLabel},
 | |
| 				},
 | |
| 			},
 | |
| 			node: nodes[0],
 | |
| 			fits: true,
 | |
| 			test: "satisfies the PodAffinity and PodAntiAffinity and PodAntiAffinity symmetry with the existing pod",
 | |
| 		},
 | |
| 		{
 | |
| 			pod: &v1.Pod{
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Name:   "fakename",
 | |
| 					Labels: podLabel2,
 | |
| 				},
 | |
| 				Spec: v1.PodSpec{
 | |
| 					Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 					Affinity: &v1.Affinity{
 | |
| 						PodAffinity: &v1.PodAffinity{
 | |
| 							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | |
| 								{
 | |
| 									LabelSelector: &metav1.LabelSelector{
 | |
| 										MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 											{
 | |
| 												Key:      "service",
 | |
| 												Operator: metav1.LabelSelectorOpIn,
 | |
| 												Values:   []string{"securityscan", "value2"},
 | |
| 											},
 | |
| 										},
 | |
| 									},
 | |
| 									TopologyKey: "region",
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 						PodAntiAffinity: &v1.PodAntiAffinity{
 | |
| 							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | |
| 								{
 | |
| 									LabelSelector: &metav1.LabelSelector{
 | |
| 										MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 											{
 | |
| 												Key:      "service",
 | |
| 												Operator: metav1.LabelSelectorOpIn,
 | |
| 												Values:   []string{"securityscan", "value2"},
 | |
| 											},
 | |
| 										},
 | |
| 									},
 | |
| 									TopologyKey: "zone",
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 			pods: []*v1.Pod{{Spec: v1.PodSpec{
 | |
| 				Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 				NodeName:   nodes[0].Name}, ObjectMeta: metav1.ObjectMeta{
 | |
| 				Name:   "fakename2",
 | |
| 				Labels: podLabel}}},
 | |
| 			node: nodes[0],
 | |
| 			fits: false,
 | |
| 			test: "satisfies the PodAffinity but doesn't satisfies the PodAntiAffinity with the existing pod",
 | |
| 		},*/
 | |
| 		{
 | |
| 			pod: &v1.Pod{
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Name:   "fakename",
 | |
| 					Labels: podLabel,
 | |
| 				},
 | |
| 				Spec: v1.PodSpec{
 | |
| 					Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 					Affinity: &v1.Affinity{
 | |
| 						PodAffinity: &v1.PodAffinity{
 | |
| 							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | |
| 								{
 | |
| 									LabelSelector: &metav1.LabelSelector{
 | |
| 										MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 											{
 | |
| 												Key:      "service",
 | |
| 												Operator: metav1.LabelSelectorOpIn,
 | |
| 												Values:   []string{"securityscan", "value2"},
 | |
| 											},
 | |
| 										},
 | |
| 									},
 | |
| 									TopologyKey: "region",
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 						PodAntiAffinity: &v1.PodAntiAffinity{
 | |
| 							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | |
| 								{
 | |
| 									LabelSelector: &metav1.LabelSelector{
 | |
| 										MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 											{
 | |
| 												Key:      "service",
 | |
| 												Operator: metav1.LabelSelectorOpIn,
 | |
| 												Values:   []string{"antivirusscan", "value2"},
 | |
| 											},
 | |
| 										},
 | |
| 									},
 | |
| 									TopologyKey: "node",
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 			pods: []*v1.Pod{
 | |
| 				{
 | |
| 					Spec: v1.PodSpec{
 | |
| 						NodeName:   nodes[0].Name,
 | |
| 						Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 						Affinity: &v1.Affinity{
 | |
| 							PodAntiAffinity: &v1.PodAntiAffinity{
 | |
| 								RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | |
| 									{
 | |
| 										LabelSelector: &metav1.LabelSelector{
 | |
| 											MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 												{
 | |
| 													Key:      "service",
 | |
| 													Operator: metav1.LabelSelectorOpIn,
 | |
| 													Values:   []string{"securityscan", "value3"},
 | |
| 												},
 | |
| 											},
 | |
| 										},
 | |
| 										TopologyKey: "zone",
 | |
| 									},
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 					ObjectMeta: metav1.ObjectMeta{
 | |
| 						Name:   "fakename2",
 | |
| 						Labels: podLabel},
 | |
| 				},
 | |
| 			},
 | |
| 			node: nodes[0],
 | |
| 			fits: false,
 | |
| 			test: "satisfies the PodAffinity and PodAntiAffinity but doesn't satisfies PodAntiAffinity symmetry with the existing pod",
 | |
| 		},
 | |
| 		{
 | |
| 			pod: &v1.Pod{
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Name:   "fakename",
 | |
| 					Labels: podLabel,
 | |
| 				},
 | |
| 				Spec: v1.PodSpec{
 | |
| 					Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 					Affinity: &v1.Affinity{
 | |
| 						PodAffinity: &v1.PodAffinity{
 | |
| 							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | |
| 								{
 | |
| 									LabelSelector: &metav1.LabelSelector{
 | |
| 										MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 											{
 | |
| 												Key:      "service",
 | |
| 												Operator: metav1.LabelSelectorOpNotIn,
 | |
| 												Values:   []string{"securityscan", "value2"},
 | |
| 											},
 | |
| 										},
 | |
| 									},
 | |
| 									TopologyKey: "region",
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 			pods: []*v1.Pod{{Spec: v1.PodSpec{
 | |
| 				Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 				NodeName:   "machine2"}, ObjectMeta: metav1.ObjectMeta{
 | |
| 				Name:   "fakename2",
 | |
| 				Labels: podLabel}}},
 | |
| 			node: nodes[0],
 | |
| 			fits: false,
 | |
| 			test: "pod matches its own Label in PodAffinity and that matches the existing pod Labels",
 | |
| 		},
 | |
| 		{
 | |
| 			pod: &v1.Pod{
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Name:   "fakename",
 | |
| 					Labels: podLabel,
 | |
| 				},
 | |
| 				Spec: v1.PodSpec{Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}}},
 | |
| 			},
 | |
| 			pods: []*v1.Pod{
 | |
| 				{
 | |
| 					Spec: v1.PodSpec{NodeName: nodes[0].Name,
 | |
| 						Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 						Affinity: &v1.Affinity{
 | |
| 							PodAntiAffinity: &v1.PodAntiAffinity{
 | |
| 								RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | |
| 									{
 | |
| 										LabelSelector: &metav1.LabelSelector{
 | |
| 											MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 												{
 | |
| 													Key:      "service",
 | |
| 													Operator: metav1.LabelSelectorOpIn,
 | |
| 													Values:   []string{"securityscan", "value2"},
 | |
| 												},
 | |
| 											},
 | |
| 										},
 | |
| 										TopologyKey: "zone",
 | |
| 									},
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 					ObjectMeta: metav1.ObjectMeta{
 | |
| 						Name:   "fakename2",
 | |
| 						Labels: podLabel},
 | |
| 				},
 | |
| 			},
 | |
| 			node: nodes[0],
 | |
| 			fits: false,
 | |
| 			test: "Verify that PodAntiAffinity of an existing pod is respected when PodAntiAffinity symmetry is not satisfied with the existing pod",
 | |
| 		},
 | |
| 		{
 | |
| 			pod: &v1.Pod{
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Name:   "fake-name",
 | |
| 					Labels: podLabel,
 | |
| 				},
 | |
| 				Spec: v1.PodSpec{Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}}},
 | |
| 			},
 | |
| 			pods: []*v1.Pod{
 | |
| 				{
 | |
| 					Spec: v1.PodSpec{NodeName: nodes[0].Name,
 | |
| 						Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 						Affinity: &v1.Affinity{
 | |
| 							PodAntiAffinity: &v1.PodAntiAffinity{
 | |
| 								RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | |
| 									{
 | |
| 										LabelSelector: &metav1.LabelSelector{
 | |
| 											MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 												{
 | |
| 													Key:      "service",
 | |
| 													Operator: metav1.LabelSelectorOpNotIn,
 | |
| 													Values:   []string{"securityscan", "value2"},
 | |
| 												},
 | |
| 											},
 | |
| 										},
 | |
| 										TopologyKey: "zone",
 | |
| 									},
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 					ObjectMeta: metav1.ObjectMeta{
 | |
| 						Name:   "fake-name2",
 | |
| 						Labels: podLabel},
 | |
| 				},
 | |
| 			},
 | |
| 			node: nodes[0],
 | |
| 			fits: true,
 | |
| 			test: "Verify that PodAntiAffinity from existing pod is respected when pod statisfies PodAntiAffinity symmetry with the existing pod",
 | |
| 		},
 | |
| 		{
 | |
| 			pod: &v1.Pod{
 | |
| 				ObjectMeta: metav1.ObjectMeta{Name: "fake-name2"},
 | |
| 				Spec: v1.PodSpec{
 | |
| 					Containers:   []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 					NodeSelector: map[string]string{"region": "r1"},
 | |
| 					Affinity: &v1.Affinity{
 | |
| 						PodAntiAffinity: &v1.PodAntiAffinity{
 | |
| 							RequiredDuringSchedulingIgnoredDuringExecution: []v1.PodAffinityTerm{
 | |
| 								{
 | |
| 									LabelSelector: &metav1.LabelSelector{
 | |
| 										MatchExpressions: []metav1.LabelSelectorRequirement{
 | |
| 											{
 | |
| 												Key:      "foo",
 | |
| 												Operator: metav1.LabelSelectorOpIn,
 | |
| 												Values:   []string{"abc"},
 | |
| 											},
 | |
| 										},
 | |
| 									},
 | |
| 									TopologyKey: "region",
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 			pods: []*v1.Pod{
 | |
| 				{Spec: v1.PodSpec{
 | |
| 					Containers: []v1.Container{{Name: "container", Image: imageutils.GetPauseImageName()}},
 | |
| 					NodeName:   nodes[0].Name}, ObjectMeta: metav1.ObjectMeta{Name: "fakename", Labels: map[string]string{"foo": "abc"}}},
 | |
| 			},
 | |
| 			fits: false,
 | |
| 			test: "nodes[0] and nodes[1] have same topologyKey and label value. nodes[0] has an existing pod that matches the inter pod affinity rule. The new pod can not be scheduled onto either of the two nodes.",
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	for _, test := range tests {
 | |
| 		for _, pod := range test.pods {
 | |
| 			var nsName string
 | |
| 			if pod.Namespace != "" {
 | |
| 				nsName = pod.Namespace
 | |
| 			} else {
 | |
| 				nsName = context.ns.Name
 | |
| 			}
 | |
| 			createdPod, err := cs.CoreV1().Pods(nsName).Create(pod)
 | |
| 			if err != nil {
 | |
| 				t.Fatalf("Test Failed: error, %v, while creating pod during test: %v", err, test.test)
 | |
| 			}
 | |
| 			err = wait.Poll(pollInterval, wait.ForeverTestTimeout, podScheduled(cs, createdPod.Namespace, createdPod.Name))
 | |
| 			if err != nil {
 | |
| 				t.Errorf("Test Failed: error, %v, while waiting for pod during test, %v", err, test)
 | |
| 			}
 | |
| 		}
 | |
| 		testPod, err := cs.CoreV1().Pods(context.ns.Name).Create(test.pod)
 | |
| 		if err != nil {
 | |
| 			if !(test.errorType == "invalidPod" && errors.IsInvalid(err)) {
 | |
| 				t.Fatalf("Test Failed: error, %v, while creating pod during test: %v", err, test.test)
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		if test.fits {
 | |
| 			err = wait.Poll(pollInterval, wait.ForeverTestTimeout, podScheduled(cs, testPod.Namespace, testPod.Name))
 | |
| 		} else {
 | |
| 			err = wait.Poll(pollInterval, wait.ForeverTestTimeout, podUnschedulable(cs, testPod.Namespace, testPod.Name))
 | |
| 		}
 | |
| 		if err != nil {
 | |
| 			t.Errorf("Test Failed: %v, err %v, test.fits %v", test.test, err, test.fits)
 | |
| 		}
 | |
| 
 | |
| 		err = cs.CoreV1().Pods(context.ns.Name).Delete(test.pod.Name, metav1.NewDeleteOptions(0))
 | |
| 		if err != nil {
 | |
| 			t.Errorf("Test Failed: error, %v, while deleting pod during test: %v", err, test.test)
 | |
| 		}
 | |
| 		err = wait.Poll(pollInterval, wait.ForeverTestTimeout, podDeleted(cs, context.ns.Name, test.pod.Name))
 | |
| 		if err != nil {
 | |
| 			t.Errorf("Test Failed: error, %v, while waiting for pod to get deleted, %v", err, test.test)
 | |
| 		}
 | |
| 		for _, pod := range test.pods {
 | |
| 			var nsName string
 | |
| 			if pod.Namespace != "" {
 | |
| 				nsName = pod.Namespace
 | |
| 			} else {
 | |
| 				nsName = context.ns.Name
 | |
| 			}
 | |
| 			err = cs.CoreV1().Pods(nsName).Delete(pod.Name, metav1.NewDeleteOptions(0))
 | |
| 			if err != nil {
 | |
| 				t.Errorf("Test Failed: error, %v, while deleting pod during test: %v", err, test.test)
 | |
| 			}
 | |
| 			err = wait.Poll(pollInterval, wait.ForeverTestTimeout, podDeleted(cs, nsName, pod.Name))
 | |
| 			if err != nil {
 | |
| 				t.Errorf("Test Failed: error, %v, while waiting for pod to get deleted, %v", err, test.test)
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // TestNodePIDPressure verifies that scheduler's CheckNodePIDPressurePredicate predicate
 | |
| // functions works correctly.
 | |
| func TestNodePIDPressure(t *testing.T) {
 | |
| 	context := initTest(t, "node-pid-pressure")
 | |
| 	defer cleanupTest(t, context)
 | |
| 	// Add a node.
 | |
| 	node, err := createNode(context.clientSet, "testnode", nil)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Cannot create node: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	cs := context.clientSet
 | |
| 
 | |
| 	// Adds PID pressure condition to the node.
 | |
| 	node.Status.Conditions = []v1.NodeCondition{
 | |
| 		{
 | |
| 			Type:   v1.NodePIDPressure,
 | |
| 			Status: v1.ConditionTrue,
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	// Update node condition.
 | |
| 	err = updateNodeStatus(context.clientSet, node)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Cannot update node: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	// Creats test pod.
 | |
| 	testPod := &v1.Pod{
 | |
| 		ObjectMeta: metav1.ObjectMeta{Name: "pidpressure-fake-name"},
 | |
| 		Spec: v1.PodSpec{
 | |
| 			Containers: []v1.Container{
 | |
| 				{Name: "container", Image: imageutils.GetPauseImageName()},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	testPod, err = cs.CoreV1().Pods(context.ns.Name).Create(testPod)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Test Failed: error: %v, while creating pod", err)
 | |
| 	}
 | |
| 
 | |
| 	err = waitForPodUnschedulable(cs, testPod)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Test Failed: error, %v, while waiting for scheduled", err)
 | |
| 	}
 | |
| 
 | |
| 	cleanupPods(cs, t, []*v1.Pod{testPod})
 | |
| }
 |