Files
velero/pkg/cmd/server/server_test.go
Carlisia Thompson 9e29e50773 Minor kubebuilder related items to clean up (#3180)
* Remove unnecessary files

Signed-off-by: Carlisia <carlisia@vmware.com>

* Switch to CAPI patch function for updates

Signed-off-by: Carlisia <carlisia@vmware.com>

* Improve table test format

Signed-off-by: Carlisia <carlisia@vmware.com>

* Refactor and add test for disabling controller

Signed-off-by: Carlisia <carlisia@vmware.com>

* Add tests

Signed-off-by: Carlisia <carlisia@vmware.com>

* Change test to use real word

Signed-off-by: Carlisia <carlisia@vmware.com>

* Fix CI

Signed-off-by: Carlisia <carlisia@vmware.com>

* Minor test fixes

Signed-off-by: Carlisia <carlisia@vmware.com>

* Remove rback/role generation

Signed-off-by: Carlisia <carlisia@vmware.com>
2021-01-21 18:22:34 -05:00

157 lines
4.9 KiB
Go

/*
Copyright 2017 the Velero contributors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package server
import (
"testing"
"github.com/stretchr/testify/assert"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
v1 "github.com/vmware-tanzu/velero/pkg/apis/velero/v1"
"github.com/vmware-tanzu/velero/pkg/controller"
velerotest "github.com/vmware-tanzu/velero/pkg/test"
)
func TestVeleroResourcesExist(t *testing.T) {
var (
fakeDiscoveryHelper = &velerotest.FakeDiscoveryHelper{}
server = &server{
logger: velerotest.NewLogger(),
discoveryHelper: fakeDiscoveryHelper,
}
)
// Velero API group doesn't exist in discovery: should error
fakeDiscoveryHelper.ResourceList = []*metav1.APIResourceList{
{
GroupVersion: "foo/v1",
APIResources: []metav1.APIResource{
{
Name: "Backups",
Kind: "Backup",
},
},
},
}
assert.Error(t, server.veleroResourcesExist())
// Velero API group doesn't contain any custom resources: should error
veleroAPIResourceList := &metav1.APIResourceList{
GroupVersion: v1.SchemeGroupVersion.String(),
}
fakeDiscoveryHelper.ResourceList = append(fakeDiscoveryHelper.ResourceList, veleroAPIResourceList)
assert.Error(t, server.veleroResourcesExist())
// Velero API group contains all custom resources: should not error
for kind := range v1.CustomResources() {
veleroAPIResourceList.APIResources = append(veleroAPIResourceList.APIResources, metav1.APIResource{
Kind: kind,
})
}
assert.NoError(t, server.veleroResourcesExist())
// Velero API group contains some but not all custom resources: should error
veleroAPIResourceList.APIResources = veleroAPIResourceList.APIResources[:3]
assert.Error(t, server.veleroResourcesExist())
}
func TestRemoveControllers(t *testing.T) {
logger := velerotest.NewLogger()
tests := []struct {
name string
disabledControllers []string
errorExpected bool
}{
{
name: "Remove one disabable controller",
disabledControllers: []string{
controller.Backup,
},
errorExpected: false,
},
{
name: "Remove all disabable controllers",
disabledControllers: []string{
controller.Backup,
controller.BackupDeletion,
controller.BackupSync,
controller.DownloadRequest,
controller.GarbageCollection,
controller.ResticRepo,
controller.Restore,
controller.Schedule,
controller.ServerStatusRequest,
},
errorExpected: false,
},
{
name: "Remove with a non-disabable controller included",
disabledControllers: []string{
controller.Backup,
controller.BackupStorageLocation,
},
errorExpected: true,
},
{
name: "Remove with a misspelled/inexisting controller name",
disabledControllers: []string{
"go",
},
errorExpected: true,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
enabledControllers := map[string]func() controllerRunInfo{
controller.BackupSync: func() controllerRunInfo { return controllerRunInfo{} },
controller.Backup: func() controllerRunInfo { return controllerRunInfo{} },
controller.Schedule: func() controllerRunInfo { return controllerRunInfo{} },
controller.GarbageCollection: func() controllerRunInfo { return controllerRunInfo{} },
controller.BackupDeletion: func() controllerRunInfo { return controllerRunInfo{} },
controller.Restore: func() controllerRunInfo { return controllerRunInfo{} },
controller.ResticRepo: func() controllerRunInfo { return controllerRunInfo{} },
controller.DownloadRequest: func() controllerRunInfo { return controllerRunInfo{} },
}
enabledRuntimeControllers := map[string]struct{}{
controller.ServerStatusRequest: {},
}
totalNumOriginalControllers := len(enabledControllers) + len(enabledRuntimeControllers)
if tt.errorExpected {
assert.Error(t, removeControllers(tt.disabledControllers, enabledControllers, enabledRuntimeControllers, logger))
} else {
assert.NoError(t, removeControllers(tt.disabledControllers, enabledControllers, enabledRuntimeControllers, logger))
totalNumEnabledControllers := len(enabledControllers) + len(enabledRuntimeControllers)
assert.Equal(t, totalNumEnabledControllers, totalNumOriginalControllers-len(tt.disabledControllers))
for _, disabled := range tt.disabledControllers {
_, ok := enabledControllers[disabled]
assert.False(t, ok)
_, ok = enabledRuntimeControllers[disabled]
assert.False(t, ok)
}
}
})
}
}