mirror of
https://github.com/vmware-tanzu/velero.git
synced 2026-01-07 13:55:20 +00:00
Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com> fix volume policy action execution Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com> remove unused files Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com> add changelog file Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com> fix CI linter errors fix linter errors address pr review comments Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com> fix via make update cmd Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com> address PR feedback and add tests Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com> fix codespell Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com> fix ci linter checks Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com> remove volsToExclude processing from volume policy logic and add tests Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com> fix ci linter issue Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com>
342 lines
8.6 KiB
Go
342 lines
8.6 KiB
Go
/*
|
|
Copyright The Velero Contributors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
package resourcepolicies
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"k8s.io/apimachinery/pkg/api/resource"
|
|
)
|
|
|
|
func TestCapacityConditionValidate(t *testing.T) {
|
|
testCases := []struct {
|
|
name string
|
|
capacity *capacity
|
|
wantErr bool
|
|
}{
|
|
{
|
|
name: "lower and upper are both zero",
|
|
capacity: &capacity{lower: *resource.NewQuantity(0, resource.DecimalSI), upper: *resource.NewQuantity(0, resource.DecimalSI)},
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "lower is zero and upper is greater than zero",
|
|
capacity: &capacity{lower: *resource.NewQuantity(0, resource.DecimalSI), upper: *resource.NewQuantity(100, resource.DecimalSI)},
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "lower is greater than upper",
|
|
capacity: &capacity{lower: *resource.NewQuantity(100, resource.DecimalSI), upper: *resource.NewQuantity(50, resource.DecimalSI)},
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "lower and upper are equal",
|
|
capacity: &capacity{lower: *resource.NewQuantity(100, resource.DecimalSI), upper: *resource.NewQuantity(100, resource.DecimalSI)},
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "lower is greater than zero and upper is zero",
|
|
capacity: &capacity{lower: *resource.NewQuantity(100, resource.DecimalSI), upper: *resource.NewQuantity(0, resource.DecimalSI)},
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "lower and upper are both not zero and lower is less than upper",
|
|
capacity: &capacity{lower: *resource.NewQuantity(100, resource.DecimalSI), upper: *resource.NewQuantity(200, resource.DecimalSI)},
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "lower and upper are both not zero and lower is equal to upper",
|
|
capacity: &capacity{lower: *resource.NewQuantity(100, resource.DecimalSI), upper: *resource.NewQuantity(100, resource.DecimalSI)},
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "lower and upper are both not zero and lower is greater than upper",
|
|
capacity: &capacity{lower: *resource.NewQuantity(200, resource.DecimalSI), upper: *resource.NewQuantity(100, resource.DecimalSI)},
|
|
wantErr: true,
|
|
},
|
|
}
|
|
|
|
for _, tc := range testCases {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
c := &capacityCondition{capacity: *tc.capacity}
|
|
err := c.validate()
|
|
|
|
if (err != nil) != tc.wantErr {
|
|
t.Fatalf("Expected error %v, but got error %v", tc.wantErr, err)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestValidate(t *testing.T) {
|
|
testCases := []struct {
|
|
name string
|
|
res *ResourcePolicies
|
|
wantErr bool
|
|
}{
|
|
{
|
|
name: "unknown key in yaml",
|
|
res: &ResourcePolicies{
|
|
Version: "v1",
|
|
VolumePolicies: []VolumePolicy{
|
|
{
|
|
Action: Action{Type: "skip"},
|
|
Conditions: map[string]interface{}{
|
|
"capacity": "0,10Gi",
|
|
"unknown": "",
|
|
"storageClass": []string{"gp2", "ebs-sc"},
|
|
"csi": interface{}(
|
|
map[string]interface{}{
|
|
"driver": "aws.efs.csi.driver",
|
|
}),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "error format of capacity",
|
|
res: &ResourcePolicies{
|
|
Version: "v1",
|
|
VolumePolicies: []VolumePolicy{
|
|
{
|
|
Action: Action{Type: "skip"},
|
|
Conditions: map[string]interface{}{
|
|
"capacity": "10Gi",
|
|
"storageClass": []string{"gp2", "ebs-sc"},
|
|
"csi": interface{}(
|
|
map[string]interface{}{
|
|
"driver": "aws.efs.csi.driver",
|
|
}),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "error format of storageClass",
|
|
res: &ResourcePolicies{
|
|
Version: "v1",
|
|
VolumePolicies: []VolumePolicy{
|
|
{
|
|
Action: Action{Type: "skip"},
|
|
Conditions: map[string]interface{}{
|
|
"capacity": "0,10Gi",
|
|
"storageClass": "ebs-sc",
|
|
"csi": interface{}(
|
|
map[string]interface{}{
|
|
"driver": "aws.efs.csi.driver",
|
|
}),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "error format of csi",
|
|
res: &ResourcePolicies{
|
|
Version: "v1",
|
|
VolumePolicies: []VolumePolicy{
|
|
{
|
|
Action: Action{Type: "skip"},
|
|
Conditions: map[string]interface{}{
|
|
"capacity": "0,10Gi",
|
|
"storageClass": []string{"gp2", "ebs-sc"},
|
|
"csi": "aws.efs.csi.driver",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "unsupported version",
|
|
res: &ResourcePolicies{
|
|
Version: "v2",
|
|
VolumePolicies: []VolumePolicy{
|
|
{
|
|
Action: Action{Type: "skip"},
|
|
Conditions: map[string]interface{}{
|
|
"capacity": "0,10Gi",
|
|
"csi": interface{}(
|
|
map[string]interface{}{
|
|
"driver": "aws.efs.csi.driver",
|
|
}),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "unsupported action",
|
|
res: &ResourcePolicies{
|
|
Version: "v1",
|
|
VolumePolicies: []VolumePolicy{
|
|
{
|
|
Action: Action{Type: "unsupported"},
|
|
Conditions: map[string]interface{}{
|
|
"capacity": "0,10Gi",
|
|
"csi": interface{}(
|
|
map[string]interface{}{
|
|
"driver": "aws.efs.csi.driver",
|
|
}),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "error format of nfs",
|
|
res: &ResourcePolicies{
|
|
Version: "v1",
|
|
VolumePolicies: []VolumePolicy{
|
|
{
|
|
Action: Action{Type: "skip"},
|
|
Conditions: map[string]interface{}{
|
|
"capacity": "0,10Gi",
|
|
"storageClass": []string{"gp2", "ebs-sc"},
|
|
"nfs": "aws.efs.csi.driver",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "supported format volume policies",
|
|
res: &ResourcePolicies{
|
|
Version: "v1",
|
|
VolumePolicies: []VolumePolicy{
|
|
{
|
|
Action: Action{Type: "skip"},
|
|
Conditions: map[string]interface{}{
|
|
"capacity": "0,10Gi",
|
|
"storageClass": []string{"gp2", "ebs-sc"},
|
|
"csi": interface{}(
|
|
map[string]interface{}{
|
|
"driver": "aws.efs.csi.driver",
|
|
}),
|
|
"nfs": interface{}(
|
|
map[string]interface{}{
|
|
"server": "192.168.20.90",
|
|
"path": "/mnt/data/",
|
|
}),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "supported format volume policies, action type snapshot",
|
|
res: &ResourcePolicies{
|
|
Version: "v1",
|
|
VolumePolicies: []VolumePolicy{
|
|
{
|
|
Action: Action{Type: "snapshot"},
|
|
Conditions: map[string]interface{}{
|
|
"capacity": "0,10Gi",
|
|
"storageClass": []string{"gp2", "ebs-sc"},
|
|
"csi": interface{}(
|
|
map[string]interface{}{
|
|
"driver": "aws.efs.csi.driver",
|
|
}),
|
|
"nfs": interface{}(
|
|
map[string]interface{}{
|
|
"server": "192.168.20.90",
|
|
"path": "/mnt/data/",
|
|
}),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "supported format volume policies, action type fs-backup",
|
|
res: &ResourcePolicies{
|
|
Version: "v1",
|
|
VolumePolicies: []VolumePolicy{
|
|
{
|
|
Action: Action{Type: "fs-backup"},
|
|
Conditions: map[string]interface{}{
|
|
"capacity": "0,10Gi",
|
|
"storageClass": []string{"gp2", "ebs-sc"},
|
|
"csi": interface{}(
|
|
map[string]interface{}{
|
|
"driver": "aws.efs.csi.driver",
|
|
}),
|
|
"nfs": interface{}(
|
|
map[string]interface{}{
|
|
"server": "192.168.20.90",
|
|
"path": "/mnt/data/",
|
|
}),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "supported format volume policies, action type fs-backup and snapshot",
|
|
res: &ResourcePolicies{
|
|
Version: "v1",
|
|
VolumePolicies: []VolumePolicy{
|
|
{
|
|
Action: Action{Type: Snapshot},
|
|
Conditions: map[string]interface{}{
|
|
"storageClass": []string{"gp2"},
|
|
},
|
|
},
|
|
{
|
|
Action: Action{Type: FSBackup},
|
|
Conditions: map[string]interface{}{
|
|
"nfs": interface{}(
|
|
map[string]interface{}{
|
|
"server": "192.168.20.90",
|
|
"path": "/mnt/data/",
|
|
}),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
wantErr: false,
|
|
},
|
|
}
|
|
for _, tc := range testCases {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
policies := &Policies{}
|
|
err1 := policies.BuildPolicy(tc.res)
|
|
err2 := policies.Validate()
|
|
|
|
if tc.wantErr {
|
|
if err1 == nil && err2 == nil {
|
|
t.Fatalf("Expected error %v, but not get error", tc.wantErr)
|
|
}
|
|
} else {
|
|
if err1 != nil || err2 != nil {
|
|
t.Fatalf("Expected error %v, but got error %v %v", tc.wantErr, err1, err2)
|
|
}
|
|
}
|
|
})
|
|
}
|
|
}
|