mirror of
https://github.com/vmware-tanzu/velero.git
synced 2026-01-03 11:45:20 +00:00
249 lines
6.9 KiB
Go
249 lines
6.9 KiB
Go
/*
|
|
Copyright the Velero contributors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package exposer
|
|
|
|
import (
|
|
"testing"
|
|
"time"
|
|
|
|
snapshotFake "github.com/kubernetes-csi/external-snapshotter/client/v8/clientset/versioned/fake"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
appsv1api "k8s.io/api/apps/v1"
|
|
corev1api "k8s.io/api/core/v1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/client-go/kubernetes/fake"
|
|
|
|
velerov1api "github.com/vmware-tanzu/velero/pkg/apis/velero/v1"
|
|
velerotest "github.com/vmware-tanzu/velero/pkg/test"
|
|
"github.com/vmware-tanzu/velero/pkg/util/kube"
|
|
)
|
|
|
|
func TestCreateBackupPodWithPriorityClass(t *testing.T) {
|
|
testCases := []struct {
|
|
name string
|
|
nodeAgentConfigMapData string
|
|
expectedPriorityClass string
|
|
description string
|
|
}{
|
|
{
|
|
name: "with priority class in config map",
|
|
nodeAgentConfigMapData: `{
|
|
"priorityClassName": "high-priority"
|
|
}`,
|
|
expectedPriorityClass: "high-priority",
|
|
description: "Should set priority class from node-agent-configmap",
|
|
},
|
|
{
|
|
name: "without priority class in config map",
|
|
nodeAgentConfigMapData: `{
|
|
"loadAffinity": []
|
|
}`,
|
|
expectedPriorityClass: "",
|
|
description: "Should have empty priority class when not specified",
|
|
},
|
|
{
|
|
name: "empty config map",
|
|
nodeAgentConfigMapData: `{}`,
|
|
expectedPriorityClass: "",
|
|
description: "Should handle empty config map gracefully",
|
|
},
|
|
}
|
|
|
|
for _, tc := range testCases {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
ctx := t.Context()
|
|
|
|
// Create fake Kubernetes client
|
|
kubeClient := fake.NewSimpleClientset()
|
|
|
|
// Create node-agent daemonset (required for getInheritedPodInfo)
|
|
daemonSet := &appsv1api.DaemonSet{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "node-agent",
|
|
Namespace: velerov1api.DefaultNamespace,
|
|
},
|
|
Spec: appsv1api.DaemonSetSpec{
|
|
Template: corev1api.PodTemplateSpec{
|
|
Spec: corev1api.PodSpec{
|
|
Containers: []corev1api.Container{
|
|
{
|
|
Name: "node-agent",
|
|
Image: "velero/velero:latest",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
_, err := kubeClient.AppsV1().DaemonSets(velerov1api.DefaultNamespace).Create(ctx, daemonSet, metav1.CreateOptions{})
|
|
require.NoError(t, err)
|
|
|
|
// Create node-agent config map
|
|
configMap := &corev1api.ConfigMap{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "node-agent-config",
|
|
Namespace: velerov1api.DefaultNamespace,
|
|
},
|
|
Data: map[string]string{
|
|
"config": tc.nodeAgentConfigMapData,
|
|
},
|
|
}
|
|
_, err = kubeClient.CoreV1().ConfigMaps(velerov1api.DefaultNamespace).Create(ctx, configMap, metav1.CreateOptions{})
|
|
require.NoError(t, err)
|
|
|
|
// Create owner object for the backup pod
|
|
ownerObject := corev1api.ObjectReference{
|
|
APIVersion: velerov1api.SchemeGroupVersion.String(),
|
|
Kind: "DataUpload",
|
|
Name: "test-dataupload",
|
|
Namespace: velerov1api.DefaultNamespace,
|
|
UID: "test-uid",
|
|
}
|
|
|
|
// Create a backup PVC
|
|
backupPVC := &corev1api.PersistentVolumeClaim{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "test-backup-pvc",
|
|
Namespace: velerov1api.DefaultNamespace,
|
|
},
|
|
Spec: corev1api.PersistentVolumeClaimSpec{
|
|
AccessModes: []corev1api.PersistentVolumeAccessMode{
|
|
corev1api.ReadWriteOnce,
|
|
},
|
|
},
|
|
}
|
|
|
|
// Create fake snapshot client
|
|
fakeSnapshotClient := snapshotFake.NewSimpleClientset()
|
|
|
|
// Create CSI snapshot exposer
|
|
exposer := &csiSnapshotExposer{
|
|
kubeClient: kubeClient,
|
|
csiSnapshotClient: fakeSnapshotClient.SnapshotV1(),
|
|
log: velerotest.NewLogger(),
|
|
}
|
|
|
|
// Call createBackupPod
|
|
pod, err := exposer.createBackupPod(
|
|
ctx,
|
|
ownerObject,
|
|
backupPVC,
|
|
time.Minute*5,
|
|
nil, // labels
|
|
nil, // annotations
|
|
nil, // tolerations
|
|
nil, // affinity
|
|
corev1api.ResourceRequirements{},
|
|
false, // backupPVCReadOnly
|
|
false, // spcNoRelabeling
|
|
kube.NodeOSLinux,
|
|
tc.expectedPriorityClass,
|
|
nil,
|
|
)
|
|
|
|
require.NoError(t, err, tc.description)
|
|
assert.NotNil(t, pod)
|
|
assert.Equal(t, tc.expectedPriorityClass, pod.Spec.PriorityClassName, tc.description)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestCreateBackupPodWithMissingConfigMap(t *testing.T) {
|
|
ctx := t.Context()
|
|
|
|
// Create fake Kubernetes client without config map
|
|
kubeClient := fake.NewSimpleClientset()
|
|
|
|
// Create node-agent daemonset (required for getInheritedPodInfo)
|
|
daemonSet := &appsv1api.DaemonSet{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "node-agent",
|
|
Namespace: velerov1api.DefaultNamespace,
|
|
},
|
|
Spec: appsv1api.DaemonSetSpec{
|
|
Template: corev1api.PodTemplateSpec{
|
|
Spec: corev1api.PodSpec{
|
|
Containers: []corev1api.Container{
|
|
{
|
|
Name: "node-agent",
|
|
Image: "velero/velero:latest",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
_, err := kubeClient.AppsV1().DaemonSets(velerov1api.DefaultNamespace).Create(ctx, daemonSet, metav1.CreateOptions{})
|
|
require.NoError(t, err)
|
|
|
|
// Create owner object for the backup pod
|
|
ownerObject := corev1api.ObjectReference{
|
|
APIVersion: velerov1api.SchemeGroupVersion.String(),
|
|
Kind: "DataUpload",
|
|
Name: "test-dataupload",
|
|
Namespace: velerov1api.DefaultNamespace,
|
|
UID: "test-uid",
|
|
}
|
|
|
|
// Create a backup PVC
|
|
backupPVC := &corev1api.PersistentVolumeClaim{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "test-backup-pvc",
|
|
Namespace: velerov1api.DefaultNamespace,
|
|
},
|
|
Spec: corev1api.PersistentVolumeClaimSpec{
|
|
AccessModes: []corev1api.PersistentVolumeAccessMode{
|
|
corev1api.ReadWriteOnce,
|
|
},
|
|
},
|
|
}
|
|
|
|
// Create fake snapshot client
|
|
fakeSnapshotClient := snapshotFake.NewSimpleClientset()
|
|
|
|
// Create CSI snapshot exposer
|
|
exposer := &csiSnapshotExposer{
|
|
kubeClient: kubeClient,
|
|
csiSnapshotClient: fakeSnapshotClient.SnapshotV1(),
|
|
log: velerotest.NewLogger(),
|
|
}
|
|
|
|
// Call createBackupPod
|
|
pod, err := exposer.createBackupPod(
|
|
ctx,
|
|
ownerObject,
|
|
backupPVC,
|
|
time.Minute*5,
|
|
nil, // labels
|
|
nil, // annotations
|
|
nil, // tolerations
|
|
nil, // affinity
|
|
corev1api.ResourceRequirements{},
|
|
false, // backupPVCReadOnly
|
|
false, // spcNoRelabeling
|
|
kube.NodeOSLinux,
|
|
"", // empty priority class since config map is missing
|
|
nil,
|
|
)
|
|
|
|
// Should succeed even when config map is missing
|
|
require.NoError(t, err, "Should succeed even when config map is missing")
|
|
assert.NotNil(t, pod)
|
|
assert.Empty(t, pod.Spec.PriorityClassName, "Should have empty priority class when config map is missing")
|
|
}
|