Skip to content

Commit

Permalink
Validate excludeNUMATopology field
Browse files Browse the repository at this point in the history
Multiple SriovNetworkNodePolicies may target the same
resource, but the new field must have the same value. Add
a resource validation step to ensure this condition is met.

Signed-off-by: Andrea Panattoni <[email protected]>
  • Loading branch information
zeeke committed May 8, 2023
1 parent 6219e3a commit 634362e
Show file tree
Hide file tree
Showing 2 changed files with 66 additions and 1 deletion.
19 changes: 18 additions & 1 deletion pkg/webhook/validate.go
Original file line number Diff line number Diff line change
Expand Up @@ -269,7 +269,24 @@ func validatePolicyForNodePolicy(
}
}
}
return true, nil

return validateExludeTopologyField(current, previous)
}

func validateExludeTopologyField(
current *sriovnetworkv1.SriovNetworkNodePolicy,
previous *sriovnetworkv1.SriovNetworkNodePolicy,
) (bool, error) {
if current.Spec.ResourceName != previous.Spec.ResourceName {
return true, nil
}

if current.Spec.ExcludeNUMATopology == previous.Spec.ExcludeNUMATopology {
return true, nil
}

return false, fmt.Errorf("excludeNUMATopology[%t] field conflicts with policy [%s].excludeNUMATopology[%t] as they target the same resource[%s]",
current.Spec.ExcludeNUMATopology, previous.GetName(), previous.Spec.ExcludeNUMATopology, current.Spec.ResourceName)
}

func validateNicModel(selector *sriovnetworkv1.SriovNetworkNicSelector, iface *sriovnetworkv1.InterfaceExt, node *corev1.Node) bool {
Expand Down
48 changes: 48 additions & 0 deletions pkg/webhook/validate_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -298,6 +298,54 @@ func TestValidatePolicyForNodeStateWithUpdatedExistingVfRange(t *testing.T) {
g.Expect(ok).To(Equal(true))
}

func TestValidatePoliciesWithDifferentExcludeNUMATopologyForTheSameResource(t *testing.T) {
current := &SriovNetworkNodePolicy{
ObjectMeta: metav1.ObjectMeta{Name: "currentPolicy"},
Spec: SriovNetworkNodePolicySpec{
ResourceName: "resourceX",
ExcludeNUMATopology: true,
},
}

previous := &SriovNetworkNodePolicy{
ObjectMeta: metav1.ObjectMeta{Name: "previousPolicy"},
Spec: SriovNetworkNodePolicySpec{
ResourceName: "resourceX",
ExcludeNUMATopology: false,
},
}

ok, err := validatePolicyForNodePolicy(current, previous)

g := NewGomegaWithT(t)
g.Expect(ok).To(Equal(false))
g.Expect(err).To(MatchError("excludeNUMATopology[true] field conflicts with policy [previousPolicy].excludeNUMATopology[false] as they target the same resource[resourceX]"))
}

func TestValidatePoliciesWithSameExcludeNUMATopologyForTheSameResource(t *testing.T) {
current := &SriovNetworkNodePolicy{
ObjectMeta: metav1.ObjectMeta{Name: "currentPolicy"},
Spec: SriovNetworkNodePolicySpec{
ResourceName: "resourceX",
ExcludeNUMATopology: true,
},
}

previous := &SriovNetworkNodePolicy{
ObjectMeta: metav1.ObjectMeta{Name: "previousPolicy"},
Spec: SriovNetworkNodePolicySpec{
ResourceName: "resourceX",
ExcludeNUMATopology: true,
},
}

ok, err := validatePolicyForNodePolicy(current, previous)

g := NewGomegaWithT(t)
g.Expect(ok).To(Equal(true))
g.Expect(err).NotTo(HaveOccurred())
}

func TestStaticValidateSriovNetworkNodePolicyWithValidVendorDevice(t *testing.T) {
policy := &SriovNetworkNodePolicy{
Spec: SriovNetworkNodePolicySpec{
Expand Down

0 comments on commit 634362e

Please sign in to comment.