742 lines
17 KiB
Go
742 lines
17 KiB
Go
/*
|
|
* Copyright 2020 The Dragonfly Authors
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
package searcher
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
"d7y.io/dragonfly/v2/manager/model"
|
|
"d7y.io/dragonfly/v2/pkg/rpc/manager"
|
|
)
|
|
|
|
func TestSchedulerCluster(t *testing.T) {
|
|
pluginDir := "."
|
|
tests := []struct {
|
|
name string
|
|
schedulerClusters []model.SchedulerCluster
|
|
conditions map[string]string
|
|
expect func(t *testing.T, data []model.SchedulerCluster, err error)
|
|
}{
|
|
{
|
|
name: "conditions is empty",
|
|
schedulerClusters: []model.SchedulerCluster{{Name: "foo"}},
|
|
conditions: map[string]string{},
|
|
expect: func(t *testing.T, data []model.SchedulerCluster, err error) {
|
|
assert := assert.New(t)
|
|
assert.EqualError(err, "empty conditions")
|
|
},
|
|
},
|
|
{
|
|
name: "scheduler clusters is empty",
|
|
schedulerClusters: []model.SchedulerCluster{},
|
|
conditions: map[string]string{"location": "foo"},
|
|
expect: func(t *testing.T, data []model.SchedulerCluster, err error) {
|
|
assert := assert.New(t)
|
|
assert.EqualError(err, "empty scheduler clusters")
|
|
},
|
|
},
|
|
{
|
|
name: "security_domain does not match",
|
|
schedulerClusters: []model.SchedulerCluster{
|
|
{
|
|
Name: "foo",
|
|
SecurityGroup: model.SecurityGroup{
|
|
SecurityRules: []model.SecurityRule{
|
|
{
|
|
Domain: "domain-2",
|
|
},
|
|
},
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "foo",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "bar",
|
|
},
|
|
},
|
|
conditions: map[string]string{"security_domain": "domain-1"},
|
|
expect: func(t *testing.T, data []model.SchedulerCluster, err error) {
|
|
assert := assert.New(t)
|
|
assert.EqualError(err, "security domain domain-1 does not match any scheduler cluster")
|
|
},
|
|
},
|
|
{
|
|
name: "scheduler clusters have default cluster",
|
|
schedulerClusters: []model.SchedulerCluster{
|
|
{
|
|
Name: "foo",
|
|
SecurityGroup: model.SecurityGroup{
|
|
SecurityRules: []model.SecurityRule{
|
|
{
|
|
Domain: "domain-2",
|
|
},
|
|
},
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "foo",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "bar",
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "bar",
|
|
State: "active",
|
|
},
|
|
},
|
|
IsDefault: true,
|
|
},
|
|
},
|
|
conditions: map[string]string{"security_domain": "domain-1"},
|
|
expect: func(t *testing.T, data []model.SchedulerCluster, err error) {
|
|
assert := assert.New(t)
|
|
assert.Equal(data[0].Name, "bar")
|
|
assert.Equal(len(data), 1)
|
|
},
|
|
},
|
|
{
|
|
name: "scheduler cluster SecurityRules does not exist",
|
|
schedulerClusters: []model.SchedulerCluster{
|
|
{
|
|
Name: "foo",
|
|
SecurityGroup: model.SecurityGroup{
|
|
SecurityRules: []model.SecurityRule{
|
|
{
|
|
Domain: "domain-2",
|
|
},
|
|
},
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "foo",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "bar",
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "bar",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
conditions: map[string]string{"security_domain": "domain-1"},
|
|
expect: func(t *testing.T, data []model.SchedulerCluster, err error) {
|
|
assert := assert.New(t)
|
|
assert.Equal(data[0].Name, "bar")
|
|
assert.Equal(len(data), 1)
|
|
},
|
|
},
|
|
{
|
|
name: "match according to security_domain condition",
|
|
schedulerClusters: []model.SchedulerCluster{
|
|
{
|
|
Name: "foo",
|
|
SecurityGroup: model.SecurityGroup{
|
|
SecurityRules: []model.SecurityRule{
|
|
{
|
|
Domain: "domain-2",
|
|
},
|
|
},
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "foo",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "bar",
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "bar",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "baz",
|
|
SecurityGroup: model.SecurityGroup{
|
|
SecurityRules: []model.SecurityRule{
|
|
{
|
|
Domain: "domain-1",
|
|
},
|
|
},
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "baz",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
conditions: map[string]string{"security_domain": "domain-1"},
|
|
expect: func(t *testing.T, data []model.SchedulerCluster, err error) {
|
|
assert := assert.New(t)
|
|
assert.Equal(data[0].Name, "baz")
|
|
assert.Equal(data[1].Name, "bar")
|
|
assert.Equal(len(data), 2)
|
|
},
|
|
},
|
|
{
|
|
name: "match according to location condition",
|
|
schedulerClusters: []model.SchedulerCluster{
|
|
{
|
|
Name: "foo",
|
|
Scopes: map[string]interface{}{
|
|
"location": "location-1",
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "foo",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "bar",
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "bar",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
conditions: map[string]string{"location": "location-1"},
|
|
expect: func(t *testing.T, data []model.SchedulerCluster, err error) {
|
|
assert := assert.New(t)
|
|
assert.Equal(data[0].Name, "foo")
|
|
assert.Equal(data[1].Name, "bar")
|
|
},
|
|
},
|
|
{
|
|
name: "match according to idc condition",
|
|
schedulerClusters: []model.SchedulerCluster{
|
|
{
|
|
Name: "foo",
|
|
Scopes: map[string]interface{}{
|
|
"idc": "idc|idc-1",
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "foo",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "bar",
|
|
Scopes: map[string]interface{}{
|
|
"idc": "idc-2|idc-3",
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "bar",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
conditions: map[string]string{"idc": "idc-2"},
|
|
expect: func(t *testing.T, data []model.SchedulerCluster, err error) {
|
|
assert := assert.New(t)
|
|
assert.Equal(data[0].Name, "bar")
|
|
assert.Equal(data[1].Name, "foo")
|
|
assert.Equal(len(data), 2)
|
|
},
|
|
},
|
|
{
|
|
name: "match according to net topology condition",
|
|
schedulerClusters: []model.SchedulerCluster{
|
|
{
|
|
Name: "foo",
|
|
Scopes: map[string]interface{}{
|
|
"net_topology": "net-topology-1",
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "foo",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "bar",
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "bar",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
conditions: map[string]string{"net_topology": "net-topology-1"},
|
|
expect: func(t *testing.T, data []model.SchedulerCluster, err error) {
|
|
assert := assert.New(t)
|
|
assert.Equal(data[0].Name, "foo")
|
|
assert.Equal(data[1].Name, "bar")
|
|
assert.Equal(len(data), 2)
|
|
},
|
|
},
|
|
{
|
|
name: "match according to location and idc condition",
|
|
schedulerClusters: []model.SchedulerCluster{
|
|
{
|
|
Name: "foo",
|
|
Scopes: map[string]interface{}{
|
|
"location": "location-1|location-2",
|
|
"idc": "idc-1|idc-2",
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "foo",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "bar",
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "bar",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
conditions: map[string]string{
|
|
"location": "location-1",
|
|
"idc": "idc-1",
|
|
},
|
|
expect: func(t *testing.T, data []model.SchedulerCluster, err error) {
|
|
assert := assert.New(t)
|
|
assert.Equal(data[0].Name, "foo")
|
|
assert.Equal(data[1].Name, "bar")
|
|
assert.Equal(len(data), 2)
|
|
},
|
|
},
|
|
{
|
|
name: "match according to security_domain and location conditions",
|
|
schedulerClusters: []model.SchedulerCluster{
|
|
{
|
|
Name: "foo",
|
|
Scopes: map[string]interface{}{
|
|
"location": "location-1",
|
|
},
|
|
SecurityGroup: model.SecurityGroup{
|
|
SecurityRules: []model.SecurityRule{
|
|
{
|
|
Domain: "domain-1",
|
|
},
|
|
},
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "foo",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "bar",
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "bar",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
conditions: map[string]string{
|
|
"security_domain": "domain-1",
|
|
"location": "location-1",
|
|
},
|
|
expect: func(t *testing.T, data []model.SchedulerCluster, err error) {
|
|
assert := assert.New(t)
|
|
assert.Equal(data[0].Name, "foo")
|
|
assert.Equal(data[1].Name, "bar")
|
|
assert.Equal(len(data), 2)
|
|
},
|
|
},
|
|
{
|
|
name: "match according to security_domain and idc conditions",
|
|
schedulerClusters: []model.SchedulerCluster{
|
|
{
|
|
Name: "foo",
|
|
Scopes: map[string]interface{}{
|
|
"idc": "idc-1",
|
|
},
|
|
SecurityGroup: model.SecurityGroup{
|
|
SecurityRules: []model.SecurityRule{
|
|
{
|
|
Domain: "domain-1",
|
|
},
|
|
},
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "foo",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "bar",
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "bar",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
conditions: map[string]string{
|
|
"security_domain": "domain-1",
|
|
"idc": "idc-1",
|
|
},
|
|
expect: func(t *testing.T, data []model.SchedulerCluster, err error) {
|
|
assert := assert.New(t)
|
|
assert.Equal(data[0].Name, "foo")
|
|
assert.Equal(data[1].Name, "bar")
|
|
assert.Equal(len(data), 2)
|
|
},
|
|
},
|
|
{
|
|
name: "match according to security_domain, idc and location conditions",
|
|
schedulerClusters: []model.SchedulerCluster{
|
|
{
|
|
Name: "foo",
|
|
Scopes: map[string]interface{}{
|
|
"idc": "idc-1",
|
|
"location": "location-1",
|
|
},
|
|
SecurityGroup: model.SecurityGroup{
|
|
SecurityRules: []model.SecurityRule{
|
|
{
|
|
Domain: "domain-1",
|
|
},
|
|
},
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "foo",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "bar",
|
|
Scopes: map[string]interface{}{
|
|
"idc": "idc-2",
|
|
"location": "location-1|location-2",
|
|
},
|
|
SecurityGroup: model.SecurityGroup{
|
|
SecurityRules: []model.SecurityRule{
|
|
{
|
|
Domain: "domain-1",
|
|
},
|
|
},
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "bar",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "baz",
|
|
Scopes: map[string]interface{}{
|
|
"idc": "idc-2",
|
|
"location": "location-1",
|
|
},
|
|
SecurityGroup: model.SecurityGroup{
|
|
SecurityRules: []model.SecurityRule{
|
|
{
|
|
Domain: "domain-2",
|
|
},
|
|
},
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "baz",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
conditions: map[string]string{
|
|
"security_domain": "domain-1",
|
|
"idc": "idc-1|idc-2",
|
|
"location": "location-1|location-2",
|
|
},
|
|
expect: func(t *testing.T, data []model.SchedulerCluster, err error) {
|
|
assert := assert.New(t)
|
|
assert.Equal(data[0].Name, "bar")
|
|
assert.Equal(data[1].Name, "foo")
|
|
assert.Equal(len(data), 2)
|
|
},
|
|
},
|
|
{
|
|
name: "match according to all conditions",
|
|
schedulerClusters: []model.SchedulerCluster{
|
|
{
|
|
Name: "foo",
|
|
Scopes: map[string]interface{}{
|
|
"idc": "idc-1",
|
|
"location": "location-2",
|
|
},
|
|
SecurityGroup: model.SecurityGroup{
|
|
SecurityRules: []model.SecurityRule{
|
|
{
|
|
Domain: "domain-1",
|
|
},
|
|
},
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "foo",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "bar",
|
|
Scopes: map[string]interface{}{
|
|
"idc": "idc-1",
|
|
"location": "location-1",
|
|
},
|
|
SecurityGroup: model.SecurityGroup{
|
|
SecurityRules: []model.SecurityRule{
|
|
{
|
|
Domain: "domain-1",
|
|
},
|
|
},
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "bar",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "baz",
|
|
Scopes: map[string]interface{}{
|
|
"idc": "idc-1",
|
|
"location": "location-1|location-2",
|
|
"net_topology": "net_topology-1",
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "baz",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "bax",
|
|
Scopes: map[string]interface{}{
|
|
"idc": "idc-1",
|
|
"location": "location-2",
|
|
"net_topology": "net_topology-1|net_topology-2",
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "bax",
|
|
State: "active",
|
|
},
|
|
},
|
|
IsDefault: true,
|
|
},
|
|
{
|
|
Name: "bac",
|
|
Scopes: map[string]interface{}{
|
|
"idc": "idc-1",
|
|
"location": "location-2",
|
|
"net_topology": "net_topology-1|net_topology-2",
|
|
},
|
|
SecurityGroup: model.SecurityGroup{
|
|
SecurityRules: []model.SecurityRule{
|
|
{
|
|
Domain: "domain-2",
|
|
},
|
|
},
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "bac",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
conditions: map[string]string{
|
|
"security_domain": "domain-1",
|
|
"idc": "idc-1|idc-2",
|
|
"location": "location-1|location-2",
|
|
"net_topology": "net_topology-1|net_topology-1",
|
|
},
|
|
expect: func(t *testing.T, data []model.SchedulerCluster, err error) {
|
|
assert := assert.New(t)
|
|
assert.Equal(data[0].Name, "bar")
|
|
assert.Equal(data[1].Name, "foo")
|
|
assert.Equal(data[2].Name, "baz")
|
|
assert.Equal(data[3].Name, "bax")
|
|
assert.Equal(len(data), 4)
|
|
},
|
|
},
|
|
{
|
|
name: "match according to all conditions with the case insensitive",
|
|
schedulerClusters: []model.SchedulerCluster{
|
|
{
|
|
Name: "foo",
|
|
Scopes: map[string]interface{}{
|
|
"idc": "IDC-1",
|
|
"location": "LOCATION-2",
|
|
},
|
|
SecurityGroup: model.SecurityGroup{
|
|
SecurityRules: []model.SecurityRule{
|
|
{
|
|
Domain: "DOMAIN-1",
|
|
},
|
|
},
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "foo",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "bar",
|
|
Scopes: map[string]interface{}{
|
|
"idc": "IDC-1",
|
|
"location": "LOCATION-1",
|
|
},
|
|
SecurityGroup: model.SecurityGroup{
|
|
SecurityRules: []model.SecurityRule{
|
|
{
|
|
Domain: "DOMAIN-1",
|
|
},
|
|
},
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "bar",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "baz",
|
|
Scopes: map[string]interface{}{
|
|
"idc": "IDC-1",
|
|
"location": "LOCATION-1|LOCATION-2",
|
|
"net_topology": "NET_TOPOLOGY-1",
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "baz",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "bax",
|
|
Scopes: map[string]interface{}{
|
|
"idc": "IDC-1",
|
|
"location": "LOCATION-2",
|
|
"net_topology": "NET_TOPOLOGY-1|NET_TOPOLOGY-2",
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "bax",
|
|
State: "active",
|
|
},
|
|
},
|
|
IsDefault: true,
|
|
},
|
|
{
|
|
Name: "bac",
|
|
Scopes: map[string]interface{}{
|
|
"idc": "IDC-1",
|
|
"location": "LOCATION-2",
|
|
"net_topology": "NET_TOPOLOGY-1|NET_TOPOLOGY-2",
|
|
},
|
|
SecurityGroup: model.SecurityGroup{
|
|
SecurityRules: []model.SecurityRule{
|
|
{
|
|
Domain: "DOMAIN-2",
|
|
},
|
|
},
|
|
},
|
|
Schedulers: []model.Scheduler{
|
|
{
|
|
HostName: "bac",
|
|
State: "active",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
conditions: map[string]string{
|
|
"security_domain": "domain-1",
|
|
"idc": "idc-1|idc-2",
|
|
"location": "location-1|location-2",
|
|
"net_topology": "net_topology-1|net_topology-1",
|
|
},
|
|
expect: func(t *testing.T, data []model.SchedulerCluster, err error) {
|
|
assert := assert.New(t)
|
|
assert.Equal(data[0].Name, "bar")
|
|
assert.Equal(data[1].Name, "foo")
|
|
assert.Equal(data[2].Name, "baz")
|
|
assert.Equal(data[3].Name, "bax")
|
|
assert.Equal(len(data), 4)
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, tc := range tests {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
searcher := New(pluginDir)
|
|
clusters, ok := searcher.FindSchedulerClusters(context.Background(), tc.schedulerClusters, &manager.ListSchedulersRequest{
|
|
HostName: "foo",
|
|
Ip: "127.0.0.1",
|
|
HostInfo: tc.conditions,
|
|
})
|
|
tc.expect(t, clusters, ok)
|
|
})
|
|
}
|
|
}
|