forked from kubevirt/kubevirt
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
tests: rename libstorage.NewRandomDataVolume*
The renamed functions create a new DataVolume object. The fact that the name of the DataVolume is chosen randomly is not important to the user of the functions. We could have implemented them with a monotonously rising index and no functionality would have been hurt. Besides, the new names are shorter and easier to read. Signed-off-by: Dan Kenigsberg <[email protected]>
- Loading branch information
1 parent
6bf6ca9
commit 41bf06e
Showing
10 changed files
with
50 additions
and
50 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -1412,7 +1412,7 @@ var _ = Describe("[rfe_id:393][crit:high][vendor:[email protected]][level:system | |
} | ||
}) | ||
It("[test_id:3239]should reject a migration of a vmi with a non-shared data volume", func() { | ||
dataVolume := libstorage.NewRandomDataVolumeWithRegistryImport(cd.DataVolumeImportUrlForContainerDisk(cd.ContainerDiskAlpine), util.NamespaceTestDefault, k8sv1.ReadWriteOnce) | ||
dataVolume := libstorage.NewDataVolumeWithRegistryImport(cd.DataVolumeImportUrlForContainerDisk(cd.ContainerDiskAlpine), util.NamespaceTestDefault, k8sv1.ReadWriteOnce) | ||
vmi := tests.NewRandomVMIWithDataVolume(dataVolume.Name) | ||
|
||
_, err := virtClient.CdiClient().CdiV1beta1().DataVolumes(dataVolume.Namespace).Create(context.Background(), dataVolume, metav1.CreateOptions{}) | ||
|
@@ -1615,7 +1615,7 @@ var _ = Describe("[rfe_id:393][crit:high][vendor:[email protected]][level:system | |
quantity, err := resource.ParseQuantity(cd.FedoraVolumeSize) | ||
Expect(err).ToNot(HaveOccurred()) | ||
url := "docker://" + cd.ContainerDiskFor(cd.ContainerDiskFedoraTestTooling) | ||
dv = libstorage.NewRandomDataVolumeWithRegistryImport(url, util.NamespaceTestDefault, k8sv1.ReadWriteMany) | ||
dv = libstorage.NewDataVolumeWithRegistryImport(url, util.NamespaceTestDefault, k8sv1.ReadWriteMany) | ||
dv.Spec.PVC.Resources.Requests["storage"] = quantity | ||
_, err = virtClient.CdiClient().CdiV1beta1().DataVolumes(dv.Namespace).Create(context.Background(), dv, metav1.CreateOptions{}) | ||
Expect(err).ToNot(HaveOccurred()) | ||
|
@@ -1668,7 +1668,7 @@ var _ = Describe("[rfe_id:393][crit:high][vendor:[email protected]][level:system | |
var dv *cdiv1.DataVolume | ||
// Create DV and alter permission of disk.img | ||
url := "docker://" + cd.ContainerDiskFor(cd.ContainerDiskAlpine) | ||
dv = libstorage.NewRandomDataVolumeWithRegistryImport(url, util.NamespaceTestDefault, k8sv1.ReadWriteMany) | ||
dv = libstorage.NewDataVolumeWithRegistryImport(url, util.NamespaceTestDefault, k8sv1.ReadWriteMany) | ||
tests.SetDataVolumeForceBindAnnotation(dv) | ||
dv.Spec.PVC.Resources.Requests["storage"] = resource.MustParse(size) | ||
_, err := virtClient.CdiClient().CdiV1beta1().DataVolumes(dv.Namespace).Create(context.Background(), dv, metav1.CreateOptions{}) | ||
|
@@ -2067,7 +2067,7 @@ var _ = Describe("[rfe_id:393][crit:high][vendor:[email protected]][level:system | |
quantity, err := resource.ParseQuantity(cd.FedoraVolumeSize) | ||
Expect(err).ToNot(HaveOccurred()) | ||
url := "docker://" + cd.ContainerDiskFor(cd.ContainerDiskFedoraTestTooling) | ||
dv := libstorage.NewRandomDataVolumeWithRegistryImport(url, util.NamespaceTestDefault, k8sv1.ReadWriteMany) | ||
dv := libstorage.NewDataVolumeWithRegistryImport(url, util.NamespaceTestDefault, k8sv1.ReadWriteMany) | ||
dv.Spec.PVC.Resources.Requests["storage"] = quantity | ||
_, err = virtClient.CdiClient().CdiV1beta1().DataVolumes(dv.Namespace).Create(context.Background(), dv, metav1.CreateOptions{}) | ||
Expect(err).ToNot(HaveOccurred()) | ||
|
@@ -2596,7 +2596,7 @@ var _ = Describe("[rfe_id:393][crit:high][vendor:[email protected]][level:system | |
Expect(err).ToNot(HaveOccurred()) | ||
|
||
url := "docker://" + cd.ContainerDiskFor(cd.ContainerDiskFedoraTestTooling) | ||
dv := libstorage.NewRandomBlockDataVolumeWithRegistryImport(url, util.NamespaceTestDefault, k8sv1.ReadWriteMany) | ||
dv := libstorage.NewBlockDataVolumeWithRegistryImport(url, util.NamespaceTestDefault, k8sv1.ReadWriteMany) | ||
dv.Spec.PVC.Resources.Requests["storage"] = quantity | ||
|
||
_, err = virtClient.CdiClient().CdiV1beta1().DataVolumes(dv.Namespace).Create(context.Background(), dv, metav1.CreateOptions{}) | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -159,7 +159,7 @@ var _ = SIGDescribe("DataVolume Integration", func() { | |
It("should succesfully start", func() { | ||
// Create DV and alter permission of disk.img | ||
url := "docker://" + cd.ContainerDiskFor(cd.ContainerDiskAlpine) | ||
dv := libstorage.NewRandomDataVolumeWithRegistryImport(url, util.NamespaceTestDefault, k8sv1.ReadWriteMany) | ||
dv := libstorage.NewDataVolumeWithRegistryImport(url, util.NamespaceTestDefault, k8sv1.ReadWriteMany) | ||
tests.SetDataVolumeForceBindAnnotation(dv) | ||
dv.Spec.PVC.Resources.Requests["storage"] = resource.MustParse(size) | ||
_, err := virtClient.CdiClient().CdiV1beta1().DataVolumes(dv.Namespace).Create(context.Background(), dv, metav1.CreateOptions{}) | ||
|
@@ -205,7 +205,7 @@ var _ = SIGDescribe("DataVolume Integration", func() { | |
|
||
It("[test_id:3189]should be successfully started and stopped multiple times", func() { | ||
|
||
dataVolume := libstorage.NewRandomDataVolumeWithRegistryImport(cd.DataVolumeImportUrlForContainerDisk(cd.ContainerDiskAlpine), util.NamespaceTestDefault, k8sv1.ReadWriteOnce) | ||
dataVolume := libstorage.NewDataVolumeWithRegistryImport(cd.DataVolumeImportUrlForContainerDisk(cd.ContainerDiskAlpine), util.NamespaceTestDefault, k8sv1.ReadWriteOnce) | ||
vmi := tests.NewRandomVMIWithDataVolume(dataVolume.Name) | ||
|
||
_, err := virtClient.CdiClient().CdiV1beta1().DataVolumes(dataVolume.Namespace).Create(context.Background(), dataVolume, metav1.CreateOptions{}) | ||
|
@@ -241,7 +241,7 @@ var _ = SIGDescribe("DataVolume Integration", func() { | |
dvs := make([]*cdiv1.DataVolume, 0, numVmis) | ||
|
||
for idx := 0; idx < numVmis; idx++ { | ||
dataVolume := libstorage.NewRandomDataVolumeWithRegistryImport(cd.DataVolumeImportUrlForContainerDisk(cd.ContainerDiskAlpine), util.NamespaceTestDefault, k8sv1.ReadWriteOnce) | ||
dataVolume := libstorage.NewDataVolumeWithRegistryImport(cd.DataVolumeImportUrlForContainerDisk(cd.ContainerDiskAlpine), util.NamespaceTestDefault, k8sv1.ReadWriteOnce) | ||
vmi := tests.NewRandomVMIWithDataVolume(dataVolume.Name) | ||
vmi.Spec.Domain.Resources.Requests[k8sv1.ResourceMemory] = resource.MustParse("128Mi") | ||
|
||
|
@@ -266,7 +266,7 @@ var _ = SIGDescribe("DataVolume Integration", func() { | |
}) | ||
|
||
It("[test_id:5252]should be successfully started when using a PVC volume owned by a DataVolume", func() { | ||
dataVolume := libstorage.NewRandomDataVolumeWithRegistryImport(cd.DataVolumeImportUrlForContainerDisk(cd.ContainerDiskAlpine), util.NamespaceTestDefault, k8sv1.ReadWriteOnce) | ||
dataVolume := libstorage.NewDataVolumeWithRegistryImport(cd.DataVolumeImportUrlForContainerDisk(cd.ContainerDiskAlpine), util.NamespaceTestDefault, k8sv1.ReadWriteOnce) | ||
vmi := tests.NewRandomVMIWithPVC(dataVolume.Name) | ||
|
||
_, err := virtClient.CdiClient().CdiV1beta1().DataVolumes(dataVolume.Namespace).Create(context.Background(), dataVolume, metav1.CreateOptions{}) | ||
|
@@ -296,7 +296,7 @@ var _ = SIGDescribe("DataVolume Integration", func() { | |
Skip("no snapshot storage class configured") | ||
} | ||
|
||
dataVolume := libstorage.NewRandomDataVolumeWithRegistryImportInStorageClass( | ||
dataVolume := libstorage.NewDataVolumeWithRegistryImportInStorageClass( | ||
cd.DataVolumeImportUrlForContainerDisk(cd.ContainerDiskAlpine), | ||
util.NamespaceTestDefault, | ||
sc, | ||
|
@@ -357,7 +357,7 @@ var _ = SIGDescribe("DataVolume Integration", func() { | |
|
||
It("[test_id:4643]should NOT be rejected when VM template lists a DataVolume, but VM lists PVC VolumeSource", func() { | ||
|
||
dv := libstorage.NewRandomDataVolumeWithRegistryImportInStorageClass(cd.DataVolumeImportUrlForContainerDisk(cd.ContainerDiskAlpine), util.NamespaceTestDefault, storageClass.Name, k8sv1.ReadWriteOnce, k8sv1.PersistentVolumeFilesystem) | ||
dv := libstorage.NewDataVolumeWithRegistryImportInStorageClass(cd.DataVolumeImportUrlForContainerDisk(cd.ContainerDiskAlpine), util.NamespaceTestDefault, storageClass.Name, k8sv1.ReadWriteOnce, k8sv1.PersistentVolumeFilesystem) | ||
_, err = virtClient.CdiClient().CdiV1beta1().DataVolumes(dv.Namespace).Create(context.Background(), dv, metav1.CreateOptions{}) | ||
Expect(err).To(BeNil()) | ||
|
||
|
@@ -402,7 +402,7 @@ var _ = SIGDescribe("DataVolume Integration", func() { | |
Expect(err).ToNot(HaveOccurred()) | ||
}) | ||
It("[Serial][test_id:4644]should fail to start when a volume is backed by PVC created by DataVolume instead of the DataVolume itself", func() { | ||
dv := libstorage.NewRandomDataVolumeWithRegistryImportInStorageClass(cd.DataVolumeImportUrlForContainerDisk(cd.ContainerDiskAlpine), util.NamespaceTestDefault, storageClass.Name, k8sv1.ReadWriteOnce, k8sv1.PersistentVolumeFilesystem) | ||
dv := libstorage.NewDataVolumeWithRegistryImportInStorageClass(cd.DataVolumeImportUrlForContainerDisk(cd.ContainerDiskAlpine), util.NamespaceTestDefault, storageClass.Name, k8sv1.ReadWriteOnce, k8sv1.PersistentVolumeFilesystem) | ||
_, err := virtClient.CdiClient().CdiV1beta1().DataVolumes(dv.Namespace).Create(context.Background(), dv, metav1.CreateOptions{}) | ||
Expect(err).To(BeNil()) | ||
|
||
|
@@ -459,7 +459,7 @@ var _ = SIGDescribe("DataVolume Integration", func() { | |
} | ||
|
||
It("shold be possible to stop VM if datavolume is crashing", func() { | ||
dataVolume := libstorage.NewRandomDataVolumeWithRegistryImport(InvalidDataVolumeUrl, util.NamespaceTestDefault, k8sv1.ReadWriteOnce) | ||
dataVolume := libstorage.NewDataVolumeWithRegistryImport(InvalidDataVolumeUrl, util.NamespaceTestDefault, k8sv1.ReadWriteOnce) | ||
vm := tests.NewRandomVirtualMachine(tests.NewRandomVMIWithDataVolume(dataVolume.Name), true) | ||
vm.Spec.DataVolumeTemplates = []v1.DataVolumeTemplateSpec{ | ||
{ | ||
|
@@ -481,7 +481,7 @@ var _ = SIGDescribe("DataVolume Integration", func() { | |
|
||
It("[test_id:3190]should correctly handle invalid DataVolumes", func() { | ||
// Don't actually create the DataVolume since it's invalid. | ||
dataVolume := libstorage.NewRandomDataVolumeWithRegistryImport(InvalidDataVolumeUrl, util.NamespaceTestDefault, k8sv1.ReadWriteOnce) | ||
dataVolume := libstorage.NewDataVolumeWithRegistryImport(InvalidDataVolumeUrl, util.NamespaceTestDefault, k8sv1.ReadWriteOnce) | ||
// Add the invalid DataVolume to a VMI | ||
vmi := tests.NewRandomVMIWithDataVolume(dataVolume.Name) | ||
// Create a VM for this VMI | ||
|
@@ -511,7 +511,7 @@ var _ = SIGDescribe("DataVolume Integration", func() { | |
fakeRegistryWithPort = fmt.Sprintf("%s:%s", fakeRegistryName, realRegistryPort) | ||
} | ||
|
||
dataVolume := libstorage.NewRandomDataVolumeWithRegistryImport(cd.DataVolumeImportUrlFromRegistryForContainerDisk(fakeRegistryWithPort, cd.ContainerDiskCirros), | ||
dataVolume := libstorage.NewDataVolumeWithRegistryImport(cd.DataVolumeImportUrlFromRegistryForContainerDisk(fakeRegistryWithPort, cd.ContainerDiskCirros), | ||
util.NamespaceTestDefault, | ||
k8sv1.ReadWriteOnce, | ||
) | ||
|
@@ -738,7 +738,7 @@ var _ = SIGDescribe("DataVolume Integration", func() { | |
Skip("Skip test when RWOFileSystem storage class is not present") | ||
} | ||
var err error | ||
dv := libstorage.NewRandomDataVolumeWithRegistryImportInStorageClass(cd.DataVolumeImportUrlForContainerDisk(cd.ContainerDiskAlpine), testsuite.NamespaceTestAlternative, storageClass, k8sv1.ReadWriteOnce, k8sv1.PersistentVolumeFilesystem) | ||
dv := libstorage.NewDataVolumeWithRegistryImportInStorageClass(cd.DataVolumeImportUrlForContainerDisk(cd.ContainerDiskAlpine), testsuite.NamespaceTestAlternative, storageClass, k8sv1.ReadWriteOnce, k8sv1.PersistentVolumeFilesystem) | ||
tests.SetDataVolumeForceBindAnnotation(dv) | ||
dataVolume, err = virtClient.CdiClient().CdiV1beta1().DataVolumes(dv.Namespace).Create(context.Background(), dv, metav1.CreateOptions{}) | ||
Expect(err).ToNot(HaveOccurred()) | ||
|
@@ -920,7 +920,7 @@ var _ = SIGDescribe("DataVolume Integration", func() { | |
return dv | ||
} | ||
DescribeTable("[rfe_id:5070][crit:medium][vendor:[email protected]][level:component]fstrim from the VM influences disk.img", func(dvChange func(*cdiv1.DataVolume) *cdiv1.DataVolume, expectSmaller bool) { | ||
dataVolume := libstorage.NewRandomDataVolumeWithRegistryImport(cd.DataVolumeImportUrlForContainerDisk(cd.ContainerDiskFedoraTestTooling), util.NamespaceTestDefault, k8sv1.ReadWriteOnce) | ||
dataVolume := libstorage.NewDataVolumeWithRegistryImport(cd.DataVolumeImportUrlForContainerDisk(cd.ContainerDiskFedoraTestTooling), util.NamespaceTestDefault, k8sv1.ReadWriteOnce) | ||
dataVolume.Spec.PVC.Resources.Requests[k8sv1.ResourceStorage] = resource.MustParse(cd.FedoraVolumeSize) | ||
dataVolume = dvChange(dataVolume) | ||
preallocated := dataVolume.Spec.Preallocation != nil && *dataVolume.Spec.Preallocation | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.