add unit test for inherited annotations
This commit is contained in:
parent
621c81fc52
commit
1ac2decdea
|
|
@ -117,7 +117,7 @@ class K8s:
|
||||||
for svc in svcs:
|
for svc in svcs:
|
||||||
for key, value in annotations.items():
|
for key, value in annotations.items():
|
||||||
if not svc.metadata.annotations or key not in svc.metadata.annotations or svc.metadata.annotations[key] != value:
|
if not svc.metadata.annotations or key not in svc.metadata.annotations or svc.metadata.annotations[key] != value:
|
||||||
print("Expected key {} not found in annotations {}".format(key, svc.metadata.annotations))
|
print("Expected key {} not found in service annotations {}".format(key, svc.metadata.annotations))
|
||||||
return False
|
return False
|
||||||
return True
|
return True
|
||||||
|
|
||||||
|
|
@ -126,7 +126,7 @@ class K8s:
|
||||||
for sset in ssets:
|
for sset in ssets:
|
||||||
for key, value in annotations.items():
|
for key, value in annotations.items():
|
||||||
if key not in sset.metadata.annotations or sset.metadata.annotations[key] != value:
|
if key not in sset.metadata.annotations or sset.metadata.annotations[key] != value:
|
||||||
print("Expected key {} not found in annotations {}".format(key, sset.metadata.annotations))
|
print("Expected key {} not found in statefulset annotations {}".format(key, sset.metadata.annotations))
|
||||||
return False
|
return False
|
||||||
return True
|
return True
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -877,8 +877,6 @@ class EndToEndTestCase(unittest.TestCase):
|
||||||
|
|
||||||
self.eventuallyTrue(lambda: k8s.check_statefulset_annotations(cluster_label, annotations), "Annotations missing")
|
self.eventuallyTrue(lambda: k8s.check_statefulset_annotations(cluster_label, annotations), "Annotations missing")
|
||||||
|
|
||||||
self.eventuallyTrue(lambda: k8s.check_statefulset_annotations(cluster_label, annotations), "Annotations missing")
|
|
||||||
|
|
||||||
@timeout_decorator.timeout(TEST_TIMEOUT_SEC)
|
@timeout_decorator.timeout(TEST_TIMEOUT_SEC)
|
||||||
@unittest.skip("Skipping this test until fixed")
|
@unittest.skip("Skipping this test until fixed")
|
||||||
def test_zzz_taint_based_eviction(self):
|
def test_zzz_taint_based_eviction(self):
|
||||||
|
|
|
||||||
|
|
@ -0,0 +1,132 @@
|
||||||
|
package cluster
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
acidv1 "github.com/zalando/postgres-operator/pkg/apis/acid.zalan.do/v1"
|
||||||
|
"github.com/zalando/postgres-operator/pkg/util"
|
||||||
|
"github.com/zalando/postgres-operator/pkg/util/config"
|
||||||
|
"github.com/zalando/postgres-operator/pkg/util/k8sutil"
|
||||||
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
"k8s.io/client-go/kubernetes/fake"
|
||||||
|
)
|
||||||
|
|
||||||
|
func newFakeK8sAnnotationsClient() (k8sutil.KubernetesClient, *fake.Clientset) {
|
||||||
|
clientSet := fake.NewSimpleClientset()
|
||||||
|
|
||||||
|
return k8sutil.KubernetesClient{
|
||||||
|
DeploymentsGetter: clientSet.AppsV1(),
|
||||||
|
EndpointsGetter: clientSet.CoreV1(),
|
||||||
|
PodsGetter: clientSet.CoreV1(),
|
||||||
|
PodDisruptionBudgetsGetter: clientSet.PolicyV1beta1(),
|
||||||
|
SecretsGetter: clientSet.CoreV1(),
|
||||||
|
ServicesGetter: clientSet.CoreV1(),
|
||||||
|
StatefulSetsGetter: clientSet.AppsV1(),
|
||||||
|
}, clientSet
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestInheritedAnnotations(t *testing.T) {
|
||||||
|
testName := "test inheriting annotations from manifest"
|
||||||
|
client, _ := newFakeK8sAnnotationsClient()
|
||||||
|
clusterName := "acid-test-cluster"
|
||||||
|
namespace := "default"
|
||||||
|
|
||||||
|
annotationKey := "acid"
|
||||||
|
pg := acidv1.Postgresql{
|
||||||
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
|
Name: clusterName,
|
||||||
|
Annotations: map[string]string{
|
||||||
|
"owned-by": annotationKey,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Spec: acidv1.PostgresSpec{
|
||||||
|
EnableReplicaConnectionPooler: boolToPointer(true),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
var cluster = New(
|
||||||
|
Config{
|
||||||
|
OpConfig: config.Config{
|
||||||
|
Resources: config.Resources{
|
||||||
|
ClusterLabels: map[string]string{"application": "spilo"},
|
||||||
|
ClusterNameLabel: "cluster-name",
|
||||||
|
InheritedAnnotations: []string{"owned-by"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}, client, pg, logger, eventRecorder)
|
||||||
|
|
||||||
|
cluster.Name = clusterName
|
||||||
|
cluster.Namespace = namespace
|
||||||
|
|
||||||
|
// test annotationsSet function
|
||||||
|
inheritedAnnotations := cluster.annotationsSet(map[string]string{})
|
||||||
|
|
||||||
|
listOptions := metav1.ListOptions{
|
||||||
|
LabelSelector: cluster.labelsSet(false).String(),
|
||||||
|
}
|
||||||
|
|
||||||
|
// check pooler deployment annotations
|
||||||
|
deployList, err := cluster.KubeClient.Deployments(namespace).List(context.TODO(), listOptions)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
for _, deploy := range deployList.Items {
|
||||||
|
if !(util.MapContains(deploy.ObjectMeta.Annotations, inheritedAnnotations)) {
|
||||||
|
t.Errorf("%s: Deployment %v not inherited annotations %#v, got %#v", testName, deploy.ObjectMeta.Name, inheritedAnnotations, deploy.ObjectMeta.Annotations)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// check statefulset annotations
|
||||||
|
stsList, err := cluster.KubeClient.StatefulSets(namespace).List(context.TODO(), listOptions)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
for _, sts := range stsList.Items {
|
||||||
|
if !(util.MapContains(sts.ObjectMeta.Annotations, inheritedAnnotations)) {
|
||||||
|
t.Errorf("%s: StatefulSet %v not inherited annotations %#v, got %#v", testName, sts.ObjectMeta.Name, inheritedAnnotations, sts.ObjectMeta.Annotations)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// check pod annotations
|
||||||
|
podList, err := cluster.KubeClient.Pods(namespace).List(context.TODO(), listOptions)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
for _, pod := range podList.Items {
|
||||||
|
if !(util.MapContains(pod.ObjectMeta.Annotations, inheritedAnnotations)) {
|
||||||
|
t.Errorf("%s: Pod %v not inherited annotations %#v, got %#v", testName, pod.ObjectMeta.Name, inheritedAnnotations, pod.ObjectMeta.Annotations)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// check service annotations
|
||||||
|
svcList, err := cluster.KubeClient.Services(namespace).List(context.TODO(), listOptions)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
for _, svc := range svcList.Items {
|
||||||
|
if !(util.MapContains(svc.ObjectMeta.Annotations, inheritedAnnotations)) {
|
||||||
|
t.Errorf("%s: Service %v not inherited annotations %#v, got %#v", testName, svc.ObjectMeta.Name, inheritedAnnotations, svc.ObjectMeta.Annotations)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// check endpoint annotations
|
||||||
|
epList, err := cluster.KubeClient.Endpoints(namespace).List(context.TODO(), listOptions)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
for _, ep := range epList.Items {
|
||||||
|
if !(util.MapContains(ep.ObjectMeta.Annotations, inheritedAnnotations)) {
|
||||||
|
t.Errorf("%s: Endpoint %v not inherited annotations %#v, got %#v", testName, ep.ObjectMeta.Name, inheritedAnnotations, ep.ObjectMeta.Annotations)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// check pod disruption budget annotations
|
||||||
|
pdbList, err := cluster.KubeClient.PodDisruptionBudgets(namespace).List(context.TODO(), listOptions)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
for _, pdb := range pdbList.Items {
|
||||||
|
if !(util.MapContains(pdb.ObjectMeta.Annotations, inheritedAnnotations)) {
|
||||||
|
t.Errorf("%s: Pod Disruption Budget %v not inherited annotations %#v, got %#v", testName, pdb.ObjectMeta.Name, inheritedAnnotations, pdb.ObjectMeta.Annotations)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// check secret annotations
|
||||||
|
secretList, err := cluster.KubeClient.Secrets(namespace).List(context.TODO(), listOptions)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
for _, secret := range secretList.Items {
|
||||||
|
if !(util.MapContains(secret.ObjectMeta.Annotations, inheritedAnnotations)) {
|
||||||
|
t.Errorf("%s: Secret %v not inherited annotations %#v, got %#v", testName, secret.ObjectMeta.Name, inheritedAnnotations, secret.ObjectMeta.Annotations)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
@ -18,7 +18,7 @@ import (
|
||||||
"k8s.io/client-go/kubernetes/fake"
|
"k8s.io/client-go/kubernetes/fake"
|
||||||
)
|
)
|
||||||
|
|
||||||
func NewFakeKubernetesClient() (k8sutil.KubernetesClient, *fake.Clientset) {
|
func newFakeK8sPVCclient() (k8sutil.KubernetesClient, *fake.Clientset) {
|
||||||
clientSet := fake.NewSimpleClientset()
|
clientSet := fake.NewSimpleClientset()
|
||||||
|
|
||||||
return k8sutil.KubernetesClient{
|
return k8sutil.KubernetesClient{
|
||||||
|
|
@ -28,7 +28,7 @@ func NewFakeKubernetesClient() (k8sutil.KubernetesClient, *fake.Clientset) {
|
||||||
|
|
||||||
func TestResizeVolumeClaim(t *testing.T) {
|
func TestResizeVolumeClaim(t *testing.T) {
|
||||||
testName := "test resizing of persistent volume claims"
|
testName := "test resizing of persistent volume claims"
|
||||||
client, _ := NewFakeKubernetesClient()
|
client, _ := newFakeK8sPVCclient()
|
||||||
clusterName := "acid-test-cluster"
|
clusterName := "acid-test-cluster"
|
||||||
namespace := "default"
|
namespace := "default"
|
||||||
newVolumeSize := "2Gi"
|
newVolumeSize := "2Gi"
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue