mirror of
https://github.com/open-cluster-management-io/ocm.git
synced 2026-05-16 06:08:40 +00:00
397 lines
11 KiB
Go
397 lines
11 KiB
Go
package addon
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"testing"
|
|
"time"
|
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
clienttesting "k8s.io/client-go/testing"
|
|
|
|
addonv1alpha1 "open-cluster-management.io/api/addon/v1alpha1"
|
|
addonfake "open-cluster-management.io/api/client/addon/clientset/versioned/fake"
|
|
addoninformers "open-cluster-management.io/api/client/addon/informers/externalversions"
|
|
clusterfake "open-cluster-management.io/api/client/cluster/clientset/versioned/fake"
|
|
clusterinformers "open-cluster-management.io/api/client/cluster/informers/externalversions"
|
|
clusterv1 "open-cluster-management.io/api/cluster/v1"
|
|
testinghelpers "open-cluster-management.io/registration/pkg/helpers/testing"
|
|
)
|
|
|
|
func TestGetAddOnLabelValue(t *testing.T) {
|
|
cases := []struct {
|
|
name string
|
|
addOnConditions []metav1.Condition
|
|
expectedValue string
|
|
}{
|
|
{
|
|
name: "no condition",
|
|
expectedValue: addOnStatusUnreachable,
|
|
},
|
|
{
|
|
name: "status is true",
|
|
addOnConditions: []metav1.Condition{
|
|
{
|
|
Type: addonv1alpha1.ManagedClusterAddOnConditionAvailable,
|
|
Status: metav1.ConditionTrue,
|
|
},
|
|
},
|
|
expectedValue: addOnStatusAvailable,
|
|
},
|
|
{
|
|
name: "status is false",
|
|
addOnConditions: []metav1.Condition{
|
|
{
|
|
Type: addonv1alpha1.ManagedClusterAddOnConditionAvailable,
|
|
Status: metav1.ConditionFalse,
|
|
},
|
|
},
|
|
expectedValue: addOnStatusUnhealthy,
|
|
},
|
|
{
|
|
name: "status is unknow",
|
|
addOnConditions: []metav1.Condition{
|
|
{
|
|
Type: addonv1alpha1.ManagedClusterAddOnConditionAvailable,
|
|
Status: metav1.ConditionUnknown,
|
|
},
|
|
},
|
|
expectedValue: addOnStatusUnreachable,
|
|
},
|
|
}
|
|
|
|
for _, c := range cases {
|
|
t.Run(c.name, func(t *testing.T) {
|
|
addOn := &addonv1alpha1.ManagedClusterAddOn{
|
|
Status: addonv1alpha1.ManagedClusterAddOnStatus{
|
|
Conditions: c.addOnConditions,
|
|
},
|
|
}
|
|
|
|
value := getAddOnLabelValue(addOn)
|
|
if c.expectedValue != value {
|
|
t.Errorf("expected %q but get %q", c.expectedValue, value)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestDiscoveryController_SyncAddOn(t *testing.T) {
|
|
clusterName := "cluster1"
|
|
deleteTime := metav1.Now()
|
|
|
|
cases := []struct {
|
|
name string
|
|
addOnName string
|
|
cluster *clusterv1.ManagedCluster
|
|
addOn *addonv1alpha1.ManagedClusterAddOn
|
|
validateActions func(t *testing.T, actions []clienttesting.Action)
|
|
}{
|
|
{
|
|
name: "addon is deleted",
|
|
addOnName: "addon1",
|
|
cluster: &clusterv1.ManagedCluster{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: clusterName,
|
|
Labels: map[string]string{
|
|
"feature.open-cluster-management.io/addon-addon1": addOnStatusAvailable,
|
|
},
|
|
},
|
|
},
|
|
validateActions: func(t *testing.T, actions []clienttesting.Action) {
|
|
testinghelpers.AssertActions(t, actions, "update")
|
|
actual := actions[0].(clienttesting.UpdateActionImpl).Object
|
|
assertNoAddonLabel(t, actual.(*clusterv1.ManagedCluster), "addon1")
|
|
},
|
|
},
|
|
{
|
|
name: "addon is deleting",
|
|
addOnName: "addon1",
|
|
cluster: &clusterv1.ManagedCluster{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: clusterName,
|
|
},
|
|
},
|
|
addOn: &addonv1alpha1.ManagedClusterAddOn{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "addon1",
|
|
DeletionTimestamp: &deleteTime,
|
|
},
|
|
},
|
|
validateActions: testinghelpers.AssertNoActions,
|
|
},
|
|
{
|
|
name: "new addon is added",
|
|
addOnName: "addon1",
|
|
cluster: &clusterv1.ManagedCluster{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: clusterName,
|
|
},
|
|
},
|
|
addOn: &addonv1alpha1.ManagedClusterAddOn{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "addon1",
|
|
Namespace: clusterName,
|
|
},
|
|
},
|
|
validateActions: func(t *testing.T, actions []clienttesting.Action) {
|
|
testinghelpers.AssertActions(t, actions, "update")
|
|
actual := actions[0].(clienttesting.UpdateActionImpl).Object
|
|
assertAddonLabel(t, actual.(*clusterv1.ManagedCluster), "addon1", addOnStatusUnreachable)
|
|
},
|
|
},
|
|
{
|
|
name: "addon status is updated",
|
|
addOnName: "addon1",
|
|
cluster: &clusterv1.ManagedCluster{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: clusterName,
|
|
Labels: map[string]string{
|
|
"feature.open-cluster-management.io/addon-addon1": addOnStatusAvailable,
|
|
},
|
|
},
|
|
},
|
|
addOn: &addonv1alpha1.ManagedClusterAddOn{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "addon1",
|
|
Namespace: clusterName,
|
|
},
|
|
},
|
|
validateActions: func(t *testing.T, actions []clienttesting.Action) {
|
|
testinghelpers.AssertActions(t, actions, "update")
|
|
actual := actions[0].(clienttesting.UpdateActionImpl).Object
|
|
assertAddonLabel(t, actual.(*clusterv1.ManagedCluster), "addon1", addOnStatusUnreachable)
|
|
},
|
|
},
|
|
{
|
|
name: "cluster is deleting",
|
|
addOnName: "addon1",
|
|
cluster: &clusterv1.ManagedCluster{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: clusterName,
|
|
DeletionTimestamp: &deleteTime,
|
|
},
|
|
},
|
|
addOn: &addonv1alpha1.ManagedClusterAddOn{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "addon1",
|
|
Namespace: clusterName,
|
|
},
|
|
},
|
|
validateActions: testinghelpers.AssertNoActions,
|
|
},
|
|
}
|
|
|
|
for _, c := range cases {
|
|
t.Run(c.name, func(t *testing.T) {
|
|
objs := []runtime.Object{}
|
|
if c.cluster != nil {
|
|
objs = append(objs, c.cluster)
|
|
}
|
|
|
|
clusterClient := clusterfake.NewSimpleClientset(objs...)
|
|
|
|
clusterInformerFactory := clusterinformers.NewSharedInformerFactory(clusterClient, time.Minute*10)
|
|
if c.cluster != nil {
|
|
clusterStore := clusterInformerFactory.Cluster().V1().ManagedClusters().Informer().GetStore()
|
|
clusterStore.Add(c.cluster)
|
|
}
|
|
|
|
objs = []runtime.Object{}
|
|
if c.addOn != nil {
|
|
objs = append(objs, c.addOn)
|
|
}
|
|
addOnClient := addonfake.NewSimpleClientset(objs...)
|
|
addOnInformerFactory := addoninformers.NewSharedInformerFactoryWithOptions(addOnClient, 10*time.Minute)
|
|
if c.addOn != nil {
|
|
addOnStore := addOnInformerFactory.Addon().V1alpha1().ManagedClusterAddOns().Informer().GetStore()
|
|
addOnStore.Add(c.addOn)
|
|
}
|
|
|
|
controller := addOnFeatureDiscoveryController{
|
|
clusterClient: clusterClient,
|
|
clusterLister: clusterInformerFactory.Cluster().V1().ManagedClusters().Lister(),
|
|
addOnLister: addOnInformerFactory.Addon().V1alpha1().ManagedClusterAddOns().Lister(),
|
|
}
|
|
|
|
err := controller.syncAddOn(context.Background(), clusterName, c.addOnName)
|
|
if err != nil {
|
|
t.Errorf("unexpected err: %v", err)
|
|
}
|
|
|
|
c.validateActions(t, clusterClient.Actions())
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestDiscoveryController_Sync(t *testing.T) {
|
|
clusterName := "cluster1"
|
|
deleteTime := metav1.Now()
|
|
|
|
cases := []struct {
|
|
name string
|
|
queueKey string
|
|
cluster *clusterv1.ManagedCluster
|
|
addOns []*addonv1alpha1.ManagedClusterAddOn
|
|
validateActions func(t *testing.T, actions []clienttesting.Action)
|
|
}{
|
|
{
|
|
name: "addon synced",
|
|
queueKey: "cluster1/addon1",
|
|
cluster: &clusterv1.ManagedCluster{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: clusterName,
|
|
},
|
|
},
|
|
addOns: []*addonv1alpha1.ManagedClusterAddOn{
|
|
{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "addon1",
|
|
Namespace: clusterName,
|
|
},
|
|
},
|
|
},
|
|
validateActions: func(t *testing.T, actions []clienttesting.Action) {
|
|
testinghelpers.AssertActions(t, actions, "update")
|
|
actual := actions[0].(clienttesting.UpdateActionImpl).Object
|
|
assertAddonLabel(t, actual.(*clusterv1.ManagedCluster), "addon1", addOnStatusUnreachable)
|
|
},
|
|
},
|
|
{
|
|
name: "cluster not found",
|
|
queueKey: clusterName,
|
|
validateActions: testinghelpers.AssertNoActions,
|
|
},
|
|
{
|
|
name: "cluster is deleting",
|
|
queueKey: clusterName,
|
|
cluster: &clusterv1.ManagedCluster{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: clusterName,
|
|
DeletionTimestamp: &deleteTime,
|
|
},
|
|
},
|
|
validateActions: testinghelpers.AssertNoActions,
|
|
},
|
|
{
|
|
name: "no change",
|
|
queueKey: clusterName,
|
|
cluster: &clusterv1.ManagedCluster{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: clusterName,
|
|
},
|
|
},
|
|
validateActions: testinghelpers.AssertNoActions,
|
|
},
|
|
{
|
|
name: "cluster synced",
|
|
queueKey: clusterName,
|
|
cluster: &clusterv1.ManagedCluster{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: clusterName,
|
|
Labels: map[string]string{
|
|
"feature.open-cluster-management.io/addon-addon4": "available",
|
|
},
|
|
},
|
|
},
|
|
addOns: []*addonv1alpha1.ManagedClusterAddOn{
|
|
{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "addon1",
|
|
Namespace: clusterName,
|
|
},
|
|
},
|
|
{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "addon2",
|
|
Namespace: clusterName,
|
|
DeletionTimestamp: &deleteTime,
|
|
},
|
|
},
|
|
{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "addon3",
|
|
Namespace: clusterName,
|
|
},
|
|
Status: addonv1alpha1.ManagedClusterAddOnStatus{
|
|
Conditions: []metav1.Condition{
|
|
{
|
|
Type: addonv1alpha1.ManagedClusterAddOnConditionAvailable,
|
|
Status: metav1.ConditionTrue,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
validateActions: func(t *testing.T, actions []clienttesting.Action) {
|
|
testinghelpers.AssertActions(t, actions, "update")
|
|
actual := actions[0].(clienttesting.UpdateActionImpl).Object
|
|
assertAddonLabel(t, actual.(*clusterv1.ManagedCluster), "addon1", addOnStatusUnreachable)
|
|
assertAddonLabel(t, actual.(*clusterv1.ManagedCluster), "addon3", addOnStatusAvailable)
|
|
assertNoAddonLabel(t, actual.(*clusterv1.ManagedCluster), "addon4")
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, c := range cases {
|
|
t.Run(c.name, func(t *testing.T) {
|
|
objs := []runtime.Object{}
|
|
if c.cluster != nil {
|
|
objs = append(objs, c.cluster)
|
|
}
|
|
|
|
clusterClient := clusterfake.NewSimpleClientset(objs...)
|
|
|
|
clusterInformerFactory := clusterinformers.NewSharedInformerFactory(clusterClient, time.Minute*10)
|
|
if c.cluster != nil {
|
|
clusterStore := clusterInformerFactory.Cluster().V1().ManagedClusters().Informer().GetStore()
|
|
clusterStore.Add(c.cluster)
|
|
}
|
|
|
|
objs = []runtime.Object{}
|
|
for _, addOn := range c.addOns {
|
|
objs = append(objs, addOn)
|
|
}
|
|
addOnClient := addonfake.NewSimpleClientset(objs...)
|
|
addOnInformerFactory := addoninformers.NewSharedInformerFactoryWithOptions(addOnClient, 10*time.Minute)
|
|
addOnStore := addOnInformerFactory.Addon().V1alpha1().ManagedClusterAddOns().Informer().GetStore()
|
|
for _, addOn := range c.addOns {
|
|
addOnStore.Add(addOn)
|
|
}
|
|
|
|
controller := addOnFeatureDiscoveryController{
|
|
clusterClient: clusterClient,
|
|
clusterLister: clusterInformerFactory.Cluster().V1().ManagedClusters().Lister(),
|
|
addOnLister: addOnInformerFactory.Addon().V1alpha1().ManagedClusterAddOns().Lister(),
|
|
}
|
|
|
|
err := controller.sync(context.Background(), testinghelpers.NewFakeSyncContext(t, c.queueKey))
|
|
if err != nil {
|
|
t.Errorf("unexpected err: %v", err)
|
|
}
|
|
|
|
c.validateActions(t, clusterClient.Actions())
|
|
})
|
|
}
|
|
}
|
|
|
|
func assertAddonLabel(t *testing.T, cluster *clusterv1.ManagedCluster, addOnName, addOnStatus string) {
|
|
key := fmt.Sprintf("%s%s", addOnFeaturePrefix, addOnName)
|
|
value, ok := cluster.Labels[key]
|
|
if !ok {
|
|
t.Errorf("label %q not found", key)
|
|
}
|
|
|
|
if value != addOnStatus {
|
|
t.Errorf("expect label value %q but found %q", addOnStatus, value)
|
|
}
|
|
}
|
|
|
|
func assertNoAddonLabel(t *testing.T, cluster *clusterv1.ManagedCluster, addOnName string) {
|
|
key := fmt.Sprintf("%s%s", addOnFeaturePrefix, addOnName)
|
|
if _, ok := cluster.Labels[key]; ok {
|
|
t.Errorf("label %q found", key)
|
|
}
|
|
}
|