forked from barak/tarpoon
Add glide.yaml and vendor deps
This commit is contained in:
parent
db918f12ad
commit
5b3d5e81bd
18880 changed files with 5166045 additions and 1 deletions
163
vendor/k8s.io/kubernetes/federation/registry/cluster/strategy_test.go
generated
vendored
Normal file
163
vendor/k8s.io/kubernetes/federation/registry/cluster/strategy_test.go
generated
vendored
Normal file
|
|
@ -0,0 +1,163 @@
|
|||
/*
|
||||
Copyright 2016 The Kubernetes Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package cluster
|
||||
|
||||
import (
|
||||
"testing"
|
||||
|
||||
"reflect"
|
||||
|
||||
"k8s.io/kubernetes/federation/apis/federation"
|
||||
"k8s.io/kubernetes/pkg/api"
|
||||
apitesting "k8s.io/kubernetes/pkg/api/testing"
|
||||
"k8s.io/kubernetes/pkg/apimachinery/registered"
|
||||
"k8s.io/kubernetes/pkg/fields"
|
||||
"k8s.io/kubernetes/pkg/labels"
|
||||
)
|
||||
|
||||
func validNewCluster() *federation.Cluster {
|
||||
return &federation.Cluster{
|
||||
ObjectMeta: api.ObjectMeta{
|
||||
Name: "foo",
|
||||
ResourceVersion: "4",
|
||||
Labels: map[string]string{
|
||||
"name": "foo",
|
||||
},
|
||||
},
|
||||
Spec: federation.ClusterSpec{
|
||||
ServerAddressByClientCIDRs: []federation.ServerAddressByClientCIDR{
|
||||
{
|
||||
ClientCIDR: "0.0.0.0/0",
|
||||
ServerAddress: "localhost:8888",
|
||||
},
|
||||
},
|
||||
},
|
||||
Status: federation.ClusterStatus{
|
||||
Conditions: []federation.ClusterCondition{
|
||||
{Type: federation.ClusterReady, Status: api.ConditionTrue},
|
||||
},
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
func invalidNewCluster() *federation.Cluster {
|
||||
// Create a cluster with empty ServerAddressByClientCIDRs (which is a required field).
|
||||
return &federation.Cluster{
|
||||
ObjectMeta: api.ObjectMeta{
|
||||
Name: "foo2",
|
||||
ResourceVersion: "5",
|
||||
},
|
||||
Status: federation.ClusterStatus{
|
||||
Conditions: []federation.ClusterCondition{
|
||||
{Type: federation.ClusterReady, Status: api.ConditionFalse},
|
||||
},
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
func TestClusterStrategy(t *testing.T) {
|
||||
ctx := api.NewDefaultContext()
|
||||
if Strategy.NamespaceScoped() {
|
||||
t.Errorf("Cluster should not be namespace scoped")
|
||||
}
|
||||
if Strategy.AllowCreateOnUpdate() {
|
||||
t.Errorf("Cluster should not allow create on update")
|
||||
}
|
||||
|
||||
cluster := validNewCluster()
|
||||
Strategy.PrepareForCreate(ctx, cluster)
|
||||
if len(cluster.Status.Conditions) != 0 {
|
||||
t.Errorf("Cluster should not allow setting conditions on create")
|
||||
}
|
||||
errs := Strategy.Validate(ctx, cluster)
|
||||
if len(errs) != 0 {
|
||||
t.Errorf("Unexpected error validating %v", errs)
|
||||
}
|
||||
|
||||
invalidCluster := invalidNewCluster()
|
||||
Strategy.PrepareForUpdate(ctx, invalidCluster, cluster)
|
||||
if reflect.DeepEqual(invalidCluster.Spec, cluster.Spec) ||
|
||||
!reflect.DeepEqual(invalidCluster.Status, cluster.Status) {
|
||||
t.Error("Only spec is expected being changed")
|
||||
}
|
||||
errs = Strategy.ValidateUpdate(ctx, invalidCluster, cluster)
|
||||
if len(errs) == 0 {
|
||||
t.Errorf("Expected a validation error")
|
||||
}
|
||||
if cluster.ResourceVersion != "4" {
|
||||
t.Errorf("Incoming resource version on update should not be mutated")
|
||||
}
|
||||
}
|
||||
|
||||
func TestClusterStatusStrategy(t *testing.T) {
|
||||
ctx := api.NewDefaultContext()
|
||||
if StatusStrategy.NamespaceScoped() {
|
||||
t.Errorf("Cluster should not be namespace scoped")
|
||||
}
|
||||
if StatusStrategy.AllowCreateOnUpdate() {
|
||||
t.Errorf("Cluster should not allow create on update")
|
||||
}
|
||||
|
||||
cluster := validNewCluster()
|
||||
invalidCluster := invalidNewCluster()
|
||||
StatusStrategy.PrepareForUpdate(ctx, cluster, invalidCluster)
|
||||
if !reflect.DeepEqual(invalidCluster.Spec, cluster.Spec) ||
|
||||
reflect.DeepEqual(invalidCluster.Status, cluster.Status) {
|
||||
t.Logf("== cluster.Spec: %v\n", cluster.Spec)
|
||||
t.Logf("== cluster.Status: %v\n", cluster.Status)
|
||||
t.Logf("== invalidCluster.Spec: %v\n", cluster.Spec)
|
||||
t.Logf("== invalidCluster.Spec: %v\n", cluster.Status)
|
||||
t.Error("Only spec is expected being changed")
|
||||
}
|
||||
errs := Strategy.ValidateUpdate(ctx, invalidCluster, cluster)
|
||||
if len(errs) == 0 {
|
||||
t.Errorf("Expected a validation error")
|
||||
}
|
||||
if cluster.ResourceVersion != "4" {
|
||||
t.Errorf("Incoming resource version on update should not be mutated")
|
||||
}
|
||||
}
|
||||
|
||||
func TestMatchCluster(t *testing.T) {
|
||||
testFieldMap := map[bool][]fields.Set{
|
||||
true: {
|
||||
{"metadata.name": "foo"},
|
||||
},
|
||||
false: {
|
||||
{"foo": "bar"},
|
||||
},
|
||||
}
|
||||
|
||||
for expectedResult, fieldSet := range testFieldMap {
|
||||
for _, field := range fieldSet {
|
||||
m := MatchCluster(labels.Everything(), field.AsSelector())
|
||||
_, matchesSingle := m.MatchesSingle()
|
||||
if e, a := expectedResult, matchesSingle; e != a {
|
||||
t.Errorf("%+v: expected %v, got %v", fieldSet, e, a)
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func TestSelectableFieldLabelConversions(t *testing.T) {
|
||||
apitesting.TestSelectableFieldLabelConversionsOfKind(t,
|
||||
registered.GroupOrDie(federation.GroupName).GroupVersion.String(),
|
||||
"Cluster",
|
||||
ClusterToSelectableFields(&federation.Cluster{}),
|
||||
nil,
|
||||
)
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue