// SPDX-License-Identifier: Apache-2.0
// Copyright 2020 Authors of Cilium
//go:build !privileged_tests
// +build !privileged_tests
package main
import (
"reflect"
"testing"
"github.com/cilium/cilium/pkg/kvstore"
)
func Test_getOldestLeases(t *testing.T) {
type args struct {
m map[string]kvstore.Value
}
tests := []struct {
name string
args args
want map[string]kvstore.Value
}{
{
name: "test-1",
args: args{
m: map[string]kvstore.Value{},
},
want: map[string]kvstore.Value{},
},
{
name: "test-2",
args: args{
m: map[string]kvstore.Value{
"foo/bar/1": {
Data: nil,
ModRevision: 1,
LeaseID: 1,
},
"foo/bar/2": {
Data: nil,
ModRevision: 2,
LeaseID: 2,
},
"foo/bar/3": {
Data: nil,
ModRevision: 3,
LeaseID: 3,
},
"foo/bar/4": {
Data: nil,
ModRevision: 4,
LeaseID: 4,
},
"foo/bar/5": {
Data: nil,
ModRevision: 5,
LeaseID: 5,
},
"foo/baz/6": {
Data: nil,
ModRevision: 6,
LeaseID: 6,
},
"foo/bbz/7": {
Data: nil,
ModRevision: 3,
LeaseID: 3,
},
},
},
want: map[string]kvstore.Value{
"foo/bar/1": {
Data: nil,
ModRevision: 1,
LeaseID: 1,
},
"foo/baz/6": {
Data: nil,
ModRevision: 6,
LeaseID: 6,
},
"foo/bbz/7": {
Data: nil,
ModRevision: 3,
LeaseID: 3,
},
},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
if got := getOldestLeases(tt.args.m); !reflect.DeepEqual(got, tt.want) {
t.Errorf("getOldestLeases() = %v, want %v", got, tt.want)
}
})
}
}
func Test_getPath(t *testing.T) {
type args struct {
k string
}
tests := []struct {
name string
args args
want string
}{
{
name: "test-1",
args: args{
k: "cilium/state/identities/v1/locks/" +
"k8s:io.cilium.k8s.policy.cluster=default;" +
"k8s:io.cilium.k8s.policy.serviceaccount=default;" +
"k8s:io.kubernetes.pod.namespace=default;k8s:k8s-app.guestbook=redis;" +
"k8s:role=master;" +
"/29c66fd840fa06f7",
},
want: "cilium/state/identities/v1/locks/" +
"k8s:io.cilium.k8s.policy.cluster=default;" +
"k8s:io.cilium.k8s.policy.serviceaccount=default;" +
"k8s:io.kubernetes.pod.namespace=default;k8s:k8s-app.guestbook=redis;" +
"k8s:role=master;",
},
{
name: "test-2",
args: args{
k: "cilium/state/identities/v1/locks/" +
"k8s:io.cilium.k8s.policy.cluster=default;" +
"k8s:role=master/////;" +
"/29c66fd840fa06f7",
},
want: "cilium/state/identities/v1/locks/" +
"k8s:io.cilium.k8s.policy.cluster=default;" +
"k8s:role=master/////;",
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
if got := keyPathFromLockPath(tt.args.k); got != tt.want {
t.Errorf("keyPathFromLockPath() = %v, want %v", got, tt.want)
}
})
}
}