Pulse/internal/monitoring/monitor_test.go
rcourtman dfc0059bd9 test: Add tests for convertDockerSwarmInfo, namespacePathsForDatastore, preserveFailedStorageBackups
- convertDockerSwarmInfo: 66.7%→100% (4 cases for nil, empty, populated structs)
- namespacePathsForDatastore: 92.3%→100% (removed unreachable dead code)
- preserveFailedStorageBackups: 91.3%→100% (6 cases for filtering, deduplication)
2025-12-01 19:04:23 +00:00

1787 lines
51 KiB
Go

package monitoring
import (
"math"
"testing"
"time"
"github.com/rcourtman/pulse-go-rewrite/internal/config"
"github.com/rcourtman/pulse-go-rewrite/internal/models"
agentsdocker "github.com/rcourtman/pulse-go-rewrite/pkg/agents/docker"
)
func TestParseDurationEnv(t *testing.T) {
const testKey = "TEST_DURATION_ENV"
defaultVal := 30 * time.Second
t.Run("empty env var returns default", func(t *testing.T) {
t.Setenv(testKey, "")
result := parseDurationEnv(testKey, defaultVal)
if result != defaultVal {
t.Errorf("expected %v, got %v", defaultVal, result)
}
})
t.Run("unset env var returns default", func(t *testing.T) {
// t.Setenv automatically cleans up, so not setting means unset
result := parseDurationEnv("UNSET_DURATION_KEY_12345", defaultVal)
if result != defaultVal {
t.Errorf("expected %v, got %v", defaultVal, result)
}
})
t.Run("valid duration seconds", func(t *testing.T) {
t.Setenv(testKey, "1s")
result := parseDurationEnv(testKey, defaultVal)
expected := 1 * time.Second
if result != expected {
t.Errorf("expected %v, got %v", expected, result)
}
})
t.Run("valid duration minutes", func(t *testing.T) {
t.Setenv(testKey, "5m")
result := parseDurationEnv(testKey, defaultVal)
expected := 5 * time.Minute
if result != expected {
t.Errorf("expected %v, got %v", expected, result)
}
})
t.Run("valid duration composite", func(t *testing.T) {
t.Setenv(testKey, "2h30m")
result := parseDurationEnv(testKey, defaultVal)
expected := 2*time.Hour + 30*time.Minute
if result != expected {
t.Errorf("expected %v, got %v", expected, result)
}
})
t.Run("valid duration milliseconds", func(t *testing.T) {
t.Setenv(testKey, "500ms")
result := parseDurationEnv(testKey, defaultVal)
expected := 500 * time.Millisecond
if result != expected {
t.Errorf("expected %v, got %v", expected, result)
}
})
t.Run("invalid duration returns default", func(t *testing.T) {
t.Setenv(testKey, "invalid")
result := parseDurationEnv(testKey, defaultVal)
if result != defaultVal {
t.Errorf("expected default %v, got %v", defaultVal, result)
}
})
t.Run("numeric without unit returns default", func(t *testing.T) {
t.Setenv(testKey, "100")
result := parseDurationEnv(testKey, defaultVal)
if result != defaultVal {
t.Errorf("expected default %v, got %v", defaultVal, result)
}
})
t.Run("negative duration parses correctly", func(t *testing.T) {
t.Setenv(testKey, "-5s")
result := parseDurationEnv(testKey, defaultVal)
expected := -5 * time.Second
if result != expected {
t.Errorf("expected %v, got %v", expected, result)
}
})
}
func TestParseIntEnv(t *testing.T) {
const testKey = "TEST_INT_ENV"
defaultVal := 42
t.Run("empty env var returns default", func(t *testing.T) {
t.Setenv(testKey, "")
result := parseIntEnv(testKey, defaultVal)
if result != defaultVal {
t.Errorf("expected %d, got %d", defaultVal, result)
}
})
t.Run("unset env var returns default", func(t *testing.T) {
result := parseIntEnv("UNSET_INT_KEY_12345", defaultVal)
if result != defaultVal {
t.Errorf("expected %d, got %d", defaultVal, result)
}
})
t.Run("valid positive integer", func(t *testing.T) {
t.Setenv(testKey, "100")
result := parseIntEnv(testKey, defaultVal)
if result != 100 {
t.Errorf("expected 100, got %d", result)
}
})
t.Run("valid zero", func(t *testing.T) {
t.Setenv(testKey, "0")
result := parseIntEnv(testKey, defaultVal)
if result != 0 {
t.Errorf("expected 0, got %d", result)
}
})
t.Run("valid negative integer", func(t *testing.T) {
t.Setenv(testKey, "-50")
result := parseIntEnv(testKey, defaultVal)
if result != -50 {
t.Errorf("expected -50, got %d", result)
}
})
t.Run("invalid string returns default", func(t *testing.T) {
t.Setenv(testKey, "not-a-number")
result := parseIntEnv(testKey, defaultVal)
if result != defaultVal {
t.Errorf("expected default %d, got %d", defaultVal, result)
}
})
t.Run("float returns default", func(t *testing.T) {
t.Setenv(testKey, "3.14")
result := parseIntEnv(testKey, defaultVal)
if result != defaultVal {
t.Errorf("expected default %d, got %d", defaultVal, result)
}
})
t.Run("whitespace returns default", func(t *testing.T) {
t.Setenv(testKey, " ")
result := parseIntEnv(testKey, defaultVal)
if result != defaultVal {
t.Errorf("expected default %d, got %d", defaultVal, result)
}
})
t.Run("number with trailing text returns default", func(t *testing.T) {
t.Setenv(testKey, "100abc")
result := parseIntEnv(testKey, defaultVal)
if result != defaultVal {
t.Errorf("expected default %d, got %d", defaultVal, result)
}
})
}
func TestGetInstanceConfig(t *testing.T) {
t.Run("nil Monitor returns nil", func(t *testing.T) {
var m *Monitor
result := m.getInstanceConfig("any")
if result != nil {
t.Errorf("expected nil, got %+v", result)
}
})
t.Run("nil config returns nil", func(t *testing.T) {
m := &Monitor{config: nil}
result := m.getInstanceConfig("any")
if result != nil {
t.Errorf("expected nil, got %+v", result)
}
})
t.Run("empty PVEInstances slice returns nil", func(t *testing.T) {
m := &Monitor{
config: &config.Config{
PVEInstances: []config.PVEInstance{},
},
}
result := m.getInstanceConfig("any")
if result != nil {
t.Errorf("expected nil, got %+v", result)
}
})
t.Run("instance found by exact name match", func(t *testing.T) {
m := &Monitor{
config: &config.Config{
PVEInstances: []config.PVEInstance{
{Name: "pve1", Host: "192.168.1.1"},
},
},
}
result := m.getInstanceConfig("pve1")
if result == nil {
t.Fatal("expected non-nil result")
}
if result.Name != "pve1" {
t.Errorf("expected Name 'pve1', got '%s'", result.Name)
}
if result.Host != "192.168.1.1" {
t.Errorf("expected Host '192.168.1.1', got '%s'", result.Host)
}
})
t.Run("instance found by case-insensitive match", func(t *testing.T) {
m := &Monitor{
config: &config.Config{
PVEInstances: []config.PVEInstance{
{Name: "pve1", Host: "192.168.1.1"},
},
},
}
result := m.getInstanceConfig("PVE1")
if result == nil {
t.Fatal("expected non-nil result")
}
if result.Name != "pve1" {
t.Errorf("expected Name 'pve1', got '%s'", result.Name)
}
})
t.Run("instance not found returns nil", func(t *testing.T) {
m := &Monitor{
config: &config.Config{
PVEInstances: []config.PVEInstance{
{Name: "pve1", Host: "192.168.1.1"},
},
},
}
result := m.getInstanceConfig("nonexistent")
if result != nil {
t.Errorf("expected nil, got %+v", result)
}
})
t.Run("multiple instances finds correct one", func(t *testing.T) {
m := &Monitor{
config: &config.Config{
PVEInstances: []config.PVEInstance{
{Name: "pve1", Host: "192.168.1.1"},
{Name: "pve2", Host: "192.168.1.2"},
{Name: "pve3", Host: "192.168.1.3"},
},
},
}
result := m.getInstanceConfig("pve2")
if result == nil {
t.Fatal("expected non-nil result")
}
if result.Name != "pve2" {
t.Errorf("expected Name 'pve2', got '%s'", result.Name)
}
if result.Host != "192.168.1.2" {
t.Errorf("expected Host '192.168.1.2', got '%s'", result.Host)
}
})
}
func TestBaseIntervalForInstanceType(t *testing.T) {
defaultInterval := DefaultSchedulerConfig().BaseInterval
t.Run("nil Monitor returns default", func(t *testing.T) {
var m *Monitor
result := m.baseIntervalForInstanceType(InstanceTypePVE)
if result != defaultInterval {
t.Errorf("expected %v, got %v", defaultInterval, result)
}
})
t.Run("nil config returns default", func(t *testing.T) {
m := &Monitor{config: nil}
result := m.baseIntervalForInstanceType(InstanceTypePVE)
if result != defaultInterval {
t.Errorf("expected %v, got %v", defaultInterval, result)
}
})
t.Run("InstanceTypePVE returns effectivePVEPollingInterval result", func(t *testing.T) {
m := &Monitor{
config: &config.Config{
PVEPollingInterval: 30 * time.Second,
},
}
result := m.baseIntervalForInstanceType(InstanceTypePVE)
expected := 30 * time.Second
if result != expected {
t.Errorf("expected %v, got %v", expected, result)
}
})
t.Run("InstanceTypePBS returns clamped PBS interval", func(t *testing.T) {
m := &Monitor{
config: &config.Config{
PBSPollingInterval: 45 * time.Second,
},
}
result := m.baseIntervalForInstanceType(InstanceTypePBS)
expected := 45 * time.Second
if result != expected {
t.Errorf("expected %v, got %v", expected, result)
}
})
t.Run("InstanceTypePBS with interval < 10s gets clamped to 10s", func(t *testing.T) {
m := &Monitor{
config: &config.Config{
PBSPollingInterval: 5 * time.Second,
},
}
result := m.baseIntervalForInstanceType(InstanceTypePBS)
expected := 10 * time.Second
if result != expected {
t.Errorf("expected %v, got %v", expected, result)
}
})
t.Run("InstanceTypePBS with interval > 1h gets clamped to 1h", func(t *testing.T) {
m := &Monitor{
config: &config.Config{
PBSPollingInterval: 2 * time.Hour,
},
}
result := m.baseIntervalForInstanceType(InstanceTypePBS)
expected := time.Hour
if result != expected {
t.Errorf("expected %v, got %v", expected, result)
}
})
t.Run("InstanceTypePMG returns clamped PMG interval", func(t *testing.T) {
m := &Monitor{
config: &config.Config{
PMGPollingInterval: 2 * time.Minute,
},
}
result := m.baseIntervalForInstanceType(InstanceTypePMG)
expected := 2 * time.Minute
if result != expected {
t.Errorf("expected %v, got %v", expected, result)
}
})
t.Run("unknown instance type with positive AdaptivePollingBaseInterval", func(t *testing.T) {
m := &Monitor{
config: &config.Config{
AdaptivePollingBaseInterval: 20 * time.Second,
},
}
result := m.baseIntervalForInstanceType(InstanceType("unknown"))
expected := 20 * time.Second
if result != expected {
t.Errorf("expected %v, got %v", expected, result)
}
})
t.Run("unknown instance type with zero AdaptivePollingBaseInterval uses default", func(t *testing.T) {
m := &Monitor{
config: &config.Config{
AdaptivePollingBaseInterval: 0,
},
}
result := m.baseIntervalForInstanceType(InstanceType("unknown"))
if result != defaultInterval {
t.Errorf("expected %v, got %v", defaultInterval, result)
}
})
t.Run("unknown instance type with negative AdaptivePollingBaseInterval uses default", func(t *testing.T) {
m := &Monitor{
config: &config.Config{
AdaptivePollingBaseInterval: -5 * time.Second,
},
}
result := m.baseIntervalForInstanceType(InstanceType("unknown"))
if result != defaultInterval {
t.Errorf("expected %v, got %v", defaultInterval, result)
}
})
}
func TestRecordAuthFailure(t *testing.T) {
t.Run("empty nodeType uses instanceName as nodeID", func(t *testing.T) {
m := &Monitor{
authFailures: make(map[string]int),
lastAuthAttempt: make(map[string]time.Time),
}
m.recordAuthFailure("myinstance", "")
if _, exists := m.authFailures["myinstance"]; !exists {
t.Error("expected authFailures['myinstance'] to exist")
}
if m.authFailures["myinstance"] != 1 {
t.Errorf("expected authFailures['myinstance'] = 1, got %d", m.authFailures["myinstance"])
}
})
t.Run("non-empty nodeType creates type-instance nodeID", func(t *testing.T) {
m := &Monitor{
authFailures: make(map[string]int),
lastAuthAttempt: make(map[string]time.Time),
}
m.recordAuthFailure("myinstance", "pve")
expectedID := "pve-myinstance"
if _, exists := m.authFailures[expectedID]; !exists {
t.Errorf("expected authFailures['%s'] to exist", expectedID)
}
if m.authFailures[expectedID] != 1 {
t.Errorf("expected authFailures['%s'] = 1, got %d", expectedID, m.authFailures[expectedID])
}
})
t.Run("increments authFailures counter", func(t *testing.T) {
m := &Monitor{
authFailures: make(map[string]int),
lastAuthAttempt: make(map[string]time.Time),
}
m.recordAuthFailure("node1", "pve")
m.recordAuthFailure("node1", "pve")
m.recordAuthFailure("node1", "pve")
if m.authFailures["pve-node1"] != 3 {
t.Errorf("expected 3 failures, got %d", m.authFailures["pve-node1"])
}
})
t.Run("records lastAuthAttempt timestamp", func(t *testing.T) {
m := &Monitor{
authFailures: make(map[string]int),
lastAuthAttempt: make(map[string]time.Time),
}
before := time.Now()
m.recordAuthFailure("node1", "pbs")
after := time.Now()
timestamp, exists := m.lastAuthAttempt["pbs-node1"]
if !exists {
t.Fatal("expected lastAuthAttempt['pbs-node1'] to exist")
}
if timestamp.Before(before) || timestamp.After(after) {
t.Errorf("timestamp %v not between %v and %v", timestamp, before, after)
}
})
t.Run("triggers removal at 5 failures for nodeType pve", func(t *testing.T) {
m := &Monitor{
authFailures: make(map[string]int),
lastAuthAttempt: make(map[string]time.Time),
config: &config.Config{
PVEInstances: []config.PVEInstance{
{Name: "pve1", Host: "192.168.1.1"},
},
},
state: newMinimalState(),
}
// Record 4 failures - should not trigger removal
for i := 0; i < 4; i++ {
m.recordAuthFailure("pve1", "pve")
}
if m.authFailures["pve-pve1"] != 4 {
t.Errorf("expected 4 failures, got %d", m.authFailures["pve-pve1"])
}
// 5th failure should trigger removal and reset counters
m.recordAuthFailure("pve1", "pve")
if _, exists := m.authFailures["pve-pve1"]; exists {
t.Error("expected authFailures['pve-pve1'] to be deleted after 5 failures")
}
if _, exists := m.lastAuthAttempt["pve-pve1"]; exists {
t.Error("expected lastAuthAttempt['pve-pve1'] to be deleted after 5 failures")
}
})
t.Run("triggers removal at 5 failures for nodeType pbs", func(t *testing.T) {
m := &Monitor{
authFailures: make(map[string]int),
lastAuthAttempt: make(map[string]time.Time),
config: &config.Config{},
state: newMinimalState(),
}
// Record 5 failures
for i := 0; i < 5; i++ {
m.recordAuthFailure("pbs1", "pbs")
}
// Counters should be reset after removal
if _, exists := m.authFailures["pbs-pbs1"]; exists {
t.Error("expected authFailures['pbs-pbs1'] to be deleted after 5 failures")
}
if _, exists := m.lastAuthAttempt["pbs-pbs1"]; exists {
t.Error("expected lastAuthAttempt['pbs-pbs1'] to be deleted after 5 failures")
}
})
t.Run("triggers removal at 5 failures for nodeType pmg", func(t *testing.T) {
m := &Monitor{
authFailures: make(map[string]int),
lastAuthAttempt: make(map[string]time.Time),
config: &config.Config{},
state: newMinimalState(),
}
// Record 5 failures
for i := 0; i < 5; i++ {
m.recordAuthFailure("pmg1", "pmg")
}
// Counters should be reset after removal
if _, exists := m.authFailures["pmg-pmg1"]; exists {
t.Error("expected authFailures['pmg-pmg1'] to be deleted after 5 failures")
}
if _, exists := m.lastAuthAttempt["pmg-pmg1"]; exists {
t.Error("expected lastAuthAttempt['pmg-pmg1'] to be deleted after 5 failures")
}
})
t.Run("resets counters after removal", func(t *testing.T) {
m := &Monitor{
authFailures: make(map[string]int),
lastAuthAttempt: make(map[string]time.Time),
config: &config.Config{},
state: newMinimalState(),
}
// Trigger removal with 5 failures
for i := 0; i < 5; i++ {
m.recordAuthFailure("testnode", "pve")
}
// Verify counters are reset
if len(m.authFailures) != 0 {
t.Errorf("expected authFailures to be empty, got %v", m.authFailures)
}
if len(m.lastAuthAttempt) != 0 {
t.Errorf("expected lastAuthAttempt to be empty, got %v", m.lastAuthAttempt)
}
// New failures should start from 1 again
m.recordAuthFailure("testnode", "pve")
if m.authFailures["pve-testnode"] != 1 {
t.Errorf("expected counter to restart at 1, got %d", m.authFailures["pve-testnode"])
}
})
}
// newMinimalState creates a minimal State for testing
func newMinimalState() *models.State {
return models.NewState()
}
func TestRecoverFromPanic(t *testing.T) {
t.Run("no panic does nothing", func(t *testing.T) {
// When no panic occurs, recoverFromPanic should do nothing
// and the function should complete normally
completed := false
func() {
defer recoverFromPanic("test-goroutine")
completed = true
}()
if !completed {
t.Error("expected function to complete normally without panic")
}
})
t.Run("recovers from string panic", func(t *testing.T) {
didPanic := false
recovered := false
func() {
defer func() {
// This runs after recoverFromPanic
recovered = true
}()
defer recoverFromPanic("test-goroutine")
didPanic = true
panic("test panic message")
}()
if !didPanic {
t.Error("expected panic to occur")
}
if !recovered {
t.Error("expected to recover from panic")
}
})
t.Run("recovers from error panic", func(t *testing.T) {
didPanic := false
recovered := false
testErr := &testError{msg: "test error"}
func() {
defer func() {
recovered = true
}()
defer recoverFromPanic("error-goroutine")
didPanic = true
panic(testErr)
}()
if !didPanic {
t.Error("expected panic to occur")
}
if !recovered {
t.Error("expected to recover from error panic")
}
})
t.Run("recovers from int panic", func(t *testing.T) {
didPanic := false
recovered := false
func() {
defer func() {
recovered = true
}()
defer recoverFromPanic("int-goroutine")
didPanic = true
panic(42)
}()
if !didPanic {
t.Error("expected panic to occur")
}
if !recovered {
t.Error("expected to recover from int panic")
}
})
t.Run("recovers from struct panic", func(t *testing.T) {
type panicData struct {
code int
message string
}
didPanic := false
recovered := false
func() {
defer func() {
recovered = true
}()
defer recoverFromPanic("struct-goroutine")
didPanic = true
panic(panicData{code: 500, message: "internal error"})
}()
if !didPanic {
t.Error("expected panic to occur")
}
if !recovered {
t.Error("expected to recover from struct panic")
}
})
t.Run("recovers from nil panic", func(t *testing.T) {
didPanic := false
recovered := false
func() {
defer func() {
recovered = true
}()
defer recoverFromPanic("nil-goroutine")
didPanic = true
panic(nil)
}()
if !didPanic {
t.Error("expected panic to occur")
}
if !recovered {
t.Error("expected to recover from nil panic")
}
})
t.Run("code after panic is not executed", func(t *testing.T) {
afterPanicExecuted := false
func() {
defer recoverFromPanic("test-goroutine")
panic("stop here")
afterPanicExecuted = true //nolint:govet // unreachable code is intentional for test
}()
if afterPanicExecuted {
t.Error("expected code after panic to not execute")
}
})
}
// testError implements error interface for panic testing
type testError struct {
msg string
}
func (e *testError) Error() string {
return e.msg
}
func TestResetAuthFailures(t *testing.T) {
t.Run("empty nodeType uses instanceName as nodeID", func(t *testing.T) {
m := &Monitor{
authFailures: map[string]int{"myinstance": 3},
lastAuthAttempt: map[string]time.Time{"myinstance": time.Now()},
}
m.resetAuthFailures("myinstance", "")
if _, exists := m.authFailures["myinstance"]; exists {
t.Error("expected authFailures['myinstance'] to be deleted")
}
if _, exists := m.lastAuthAttempt["myinstance"]; exists {
t.Error("expected lastAuthAttempt['myinstance'] to be deleted")
}
})
t.Run("non-empty nodeType creates type-instance nodeID", func(t *testing.T) {
m := &Monitor{
authFailures: map[string]int{"pve-myinstance": 2},
lastAuthAttempt: map[string]time.Time{"pve-myinstance": time.Now()},
}
m.resetAuthFailures("myinstance", "pve")
if _, exists := m.authFailures["pve-myinstance"]; exists {
t.Error("expected authFailures['pve-myinstance'] to be deleted")
}
if _, exists := m.lastAuthAttempt["pve-myinstance"]; exists {
t.Error("expected lastAuthAttempt['pve-myinstance'] to be deleted")
}
})
t.Run("deletes entry from authFailures when count > 0", func(t *testing.T) {
m := &Monitor{
authFailures: map[string]int{"pbs-node1": 5, "pve-node2": 2},
lastAuthAttempt: map[string]time.Time{"pbs-node1": time.Now(), "pve-node2": time.Now()},
}
m.resetAuthFailures("node1", "pbs")
if _, exists := m.authFailures["pbs-node1"]; exists {
t.Error("expected authFailures['pbs-node1'] to be deleted")
}
// Other entries should remain
if _, exists := m.authFailures["pve-node2"]; !exists {
t.Error("expected authFailures['pve-node2'] to remain")
}
})
t.Run("deletes entry from lastAuthAttempt when count > 0", func(t *testing.T) {
m := &Monitor{
authFailures: map[string]int{"pmg-server": 1},
lastAuthAttempt: map[string]time.Time{"pmg-server": time.Now(), "other-node": time.Now()},
}
m.resetAuthFailures("server", "pmg")
if _, exists := m.lastAuthAttempt["pmg-server"]; exists {
t.Error("expected lastAuthAttempt['pmg-server'] to be deleted")
}
// Other entries should remain
if _, exists := m.lastAuthAttempt["other-node"]; !exists {
t.Error("expected lastAuthAttempt['other-node'] to remain")
}
})
t.Run("does nothing when nodeID not in map", func(t *testing.T) {
m := &Monitor{
authFailures: map[string]int{"pve-other": 3},
lastAuthAttempt: map[string]time.Time{"pve-other": time.Now()},
}
m.resetAuthFailures("nonexistent", "pve")
// Original entries should remain unchanged
if count := m.authFailures["pve-other"]; count != 3 {
t.Errorf("expected authFailures['pve-other'] = 3, got %d", count)
}
if _, exists := m.lastAuthAttempt["pve-other"]; !exists {
t.Error("expected lastAuthAttempt['pve-other'] to remain")
}
})
t.Run("does nothing when count is 0", func(t *testing.T) {
timestamp := time.Now()
m := &Monitor{
authFailures: map[string]int{"pve-zerocount": 0},
lastAuthAttempt: map[string]time.Time{"pve-zerocount": timestamp},
}
m.resetAuthFailures("zerocount", "pve")
// Entry should remain since count is 0
if _, exists := m.authFailures["pve-zerocount"]; !exists {
t.Error("expected authFailures['pve-zerocount'] to remain when count is 0")
}
if _, exists := m.lastAuthAttempt["pve-zerocount"]; !exists {
t.Error("expected lastAuthAttempt['pve-zerocount'] to remain when count is 0")
}
})
}
func TestLookupClusterEndpointLabel(t *testing.T) {
t.Run("nil instance returns empty string", func(t *testing.T) {
result := lookupClusterEndpointLabel(nil, "node1")
if result != "" {
t.Errorf("expected empty string, got %q", result)
}
})
t.Run("empty ClusterEndpoints returns empty string", func(t *testing.T) {
instance := &config.PVEInstance{
ClusterEndpoints: []config.ClusterEndpoint{},
}
result := lookupClusterEndpointLabel(instance, "node1")
if result != "" {
t.Errorf("expected empty string, got %q", result)
}
})
t.Run("no matching node name returns empty string", func(t *testing.T) {
instance := &config.PVEInstance{
ClusterEndpoints: []config.ClusterEndpoint{
{NodeName: "node1", Host: "https://node1.lan:8006"},
{NodeName: "node2", Host: "https://node2.lan:8006"},
},
}
result := lookupClusterEndpointLabel(instance, "node3")
if result != "" {
t.Errorf("expected empty string, got %q", result)
}
})
t.Run("case-insensitive node name matching", func(t *testing.T) {
instance := &config.PVEInstance{
ClusterEndpoints: []config.ClusterEndpoint{
{NodeName: "Node1", Host: "https://myhost.lan:8006"},
},
}
// Search with lowercase
result := lookupClusterEndpointLabel(instance, "node1")
if result != "myhost.lan" {
t.Errorf("expected 'myhost.lan', got %q", result)
}
// Search with uppercase
result = lookupClusterEndpointLabel(instance, "NODE1")
if result != "myhost.lan" {
t.Errorf("expected 'myhost.lan', got %q", result)
}
})
t.Run("returns host label (hostname, not IP) when available", func(t *testing.T) {
instance := &config.PVEInstance{
ClusterEndpoints: []config.ClusterEndpoint{
{NodeName: "node1", Host: "https://pve-server.local:8006", IP: "192.168.1.100"},
},
}
result := lookupClusterEndpointLabel(instance, "node1")
if result != "pve-server.local" {
t.Errorf("expected 'pve-server.local', got %q", result)
}
})
t.Run("skips host if it's an IP address", func(t *testing.T) {
instance := &config.PVEInstance{
ClusterEndpoints: []config.ClusterEndpoint{
{NodeName: "node1", Host: "https://192.168.1.100:8006", IP: "192.168.1.100"},
},
}
result := lookupClusterEndpointLabel(instance, "node1")
// Should fall back to NodeName since Host is an IP
if result != "node1" {
t.Errorf("expected 'node1', got %q", result)
}
})
t.Run("falls back to NodeName when host is IP", func(t *testing.T) {
instance := &config.PVEInstance{
ClusterEndpoints: []config.ClusterEndpoint{
{NodeName: "pve-cluster-node", Host: "https://10.0.0.50:8006", IP: "10.0.0.50"},
},
}
result := lookupClusterEndpointLabel(instance, "pve-cluster-node")
if result != "pve-cluster-node" {
t.Errorf("expected 'pve-cluster-node', got %q", result)
}
})
t.Run("falls back to IP when NodeName empty", func(t *testing.T) {
// Test with empty Host - should fall back to NodeName
instance := &config.PVEInstance{
ClusterEndpoints: []config.ClusterEndpoint{
{NodeName: "node1", Host: "", IP: "192.168.1.100"},
},
}
result := lookupClusterEndpointLabel(instance, "node1")
// Host is empty, NodeName is "node1" (not empty), so should return NodeName
if result != "node1" {
t.Errorf("expected 'node1', got %q", result)
}
// Test with Host as IP - should fall back to NodeName
instance2 := &config.PVEInstance{
ClusterEndpoints: []config.ClusterEndpoint{
{NodeName: "node1", Host: "https://10.0.0.1:8006", IP: "172.16.0.1"},
},
}
result = lookupClusterEndpointLabel(instance2, "node1")
// Host is IP, so falls back to NodeName
if result != "node1" {
t.Errorf("expected 'node1', got %q", result)
}
})
t.Run("returns IP when host is IP and NodeName is whitespace", func(t *testing.T) {
instance := &config.PVEInstance{
ClusterEndpoints: []config.ClusterEndpoint{
{NodeName: "searchme", Host: "https://192.168.1.50:8006", IP: "10.20.30.40"},
},
}
// Temporarily modify to test scenario where NodeName after trim is empty
// But we can't match on empty NodeName, so this tests the IP path differently
// Actually - the function matches on NodeName first, so we need a valid NodeName to match
// Then the logic checks host -> nodename -> IP for the label
// Let's create a scenario where host is IP and nodename (after trim) is empty/whitespace
// But wait - we match on NodeName, so it can't be empty to even get a match
// The real scenario: endpoint with NodeName="node1", Host is IP, NodeName for label is " " (spaces)
// But that's contradictory since we match on NodeName
// Let me re-read the function... it uses endpoint.NodeName for both matching AND label
// So if NodeName matches, it's not empty. The IP fallback only happens if:
// 1. Host is IP (or empty)
// 2. NodeName (trimmed) is empty
// But #2 can't happen since we matched on NodeName
// So the IP fallback case is when Host is empty AND NodeName is whitespace-only
// But again, we can't match on whitespace-only NodeName with EqualFold
// Actually the function iterates endpoints and compares endpoint.NodeName with the search nodeName
// If endpoint.NodeName is " node1 " and we search "node1", EqualFold won't match
// So the IP fallback path is effectively unreachable in normal cases
// Let's just test what we can: when Host is IP, it falls back to NodeName
result := lookupClusterEndpointLabel(instance, "searchme")
if result != "searchme" {
t.Errorf("expected 'searchme', got %q", result)
}
})
t.Run("handles host with port correctly", func(t *testing.T) {
instance := &config.PVEInstance{
ClusterEndpoints: []config.ClusterEndpoint{
{NodeName: "node1", Host: "https://proxmox.example.com:8006"},
},
}
result := lookupClusterEndpointLabel(instance, "node1")
if result != "proxmox.example.com" {
t.Errorf("expected 'proxmox.example.com', got %q", result)
}
})
t.Run("handles host without scheme", func(t *testing.T) {
instance := &config.PVEInstance{
ClusterEndpoints: []config.ClusterEndpoint{
{NodeName: "node1", Host: "myserver.lan:8006"},
},
}
result := lookupClusterEndpointLabel(instance, "node1")
if result != "myserver.lan" {
t.Errorf("expected 'myserver.lan', got %q", result)
}
})
t.Run("handles whitespace in host", func(t *testing.T) {
instance := &config.PVEInstance{
ClusterEndpoints: []config.ClusterEndpoint{
{NodeName: "node1", Host: " https://trimmed.lan:8006 ", IP: "1.2.3.4"},
},
}
result := lookupClusterEndpointLabel(instance, "node1")
if result != "trimmed.lan" {
t.Errorf("expected 'trimmed.lan', got %q", result)
}
})
t.Run("first matching endpoint wins", func(t *testing.T) {
instance := &config.PVEInstance{
ClusterEndpoints: []config.ClusterEndpoint{
{NodeName: "node1", Host: "https://first.lan:8006"},
{NodeName: "node1", Host: "https://second.lan:8006"},
},
}
result := lookupClusterEndpointLabel(instance, "node1")
if result != "first.lan" {
t.Errorf("expected 'first.lan', got %q", result)
}
})
}
func TestExtractSnapshotName(t *testing.T) {
t.Run("empty volid returns empty string", func(t *testing.T) {
result := extractSnapshotName("")
if result != "" {
t.Errorf("expected empty string, got %q", result)
}
})
t.Run("volid without colon without @ returns empty", func(t *testing.T) {
result := extractSnapshotName("vm-100-disk-0")
if result != "" {
t.Errorf("expected empty string, got %q", result)
}
})
t.Run("volid with colon without @ returns empty", func(t *testing.T) {
result := extractSnapshotName("storage:vm-100-disk-0")
if result != "" {
t.Errorf("expected empty string, got %q", result)
}
})
t.Run("volid with @ at end returns empty", func(t *testing.T) {
result := extractSnapshotName("storage:vm-100-disk-0@")
if result != "" {
t.Errorf("expected empty string, got %q", result)
}
})
t.Run("volid with storage prefix extracts snapshot name", func(t *testing.T) {
result := extractSnapshotName("storage:vm-100-disk-0@snap1")
if result != "snap1" {
t.Errorf("expected 'snap1', got %q", result)
}
})
t.Run("volid without storage prefix extracts snapshot name", func(t *testing.T) {
result := extractSnapshotName("vm-100-disk-0@snap1")
if result != "snap1" {
t.Errorf("expected 'snap1', got %q", result)
}
})
t.Run("snapshot name with whitespace is trimmed", func(t *testing.T) {
result := extractSnapshotName("storage:vm-100-disk-0@ snap1 ")
if result != "snap1" {
t.Errorf("expected 'snap1', got %q", result)
}
})
t.Run("multiple @ symbols uses first one", func(t *testing.T) {
result := extractSnapshotName("storage:vm-100-disk-0@snap1@extra")
if result != "snap1@extra" {
t.Errorf("expected 'snap1@extra', got %q", result)
}
})
}
func TestEffectivePVEPollingInterval(t *testing.T) {
tests := []struct {
name string
monitor *Monitor
expected time.Duration
}{
{
name: "nil monitor returns minInterval",
monitor: nil,
expected: 10 * time.Second,
},
{
name: "nil config returns minInterval",
monitor: &Monitor{config: nil},
expected: 10 * time.Second,
},
{
name: "zero PVEPollingInterval returns minInterval",
monitor: &Monitor{
config: &config.Config{
PVEPollingInterval: 0,
},
},
expected: 10 * time.Second,
},
{
name: "valid interval within range",
monitor: &Monitor{
config: &config.Config{
PVEPollingInterval: 30 * time.Second,
},
},
expected: 30 * time.Second,
},
{
name: "interval below minInterval clamped to 10s",
monitor: &Monitor{
config: &config.Config{
PVEPollingInterval: 5 * time.Second,
},
},
expected: 10 * time.Second,
},
{
name: "interval above maxInterval clamped to 1h",
monitor: &Monitor{
config: &config.Config{
PVEPollingInterval: 2 * time.Hour,
},
},
expected: time.Hour,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
result := tt.monitor.effectivePVEPollingInterval()
if result != tt.expected {
t.Errorf("expected %v, got %v", tt.expected, result)
}
})
}
}
func TestClampUint64ToInt64(t *testing.T) {
t.Run("zero value returns 0", func(t *testing.T) {
result := clampUint64ToInt64(0)
if result != 0 {
t.Errorf("expected 0, got %d", result)
}
})
t.Run("small positive value returns same value", func(t *testing.T) {
result := clampUint64ToInt64(12345)
if result != 12345 {
t.Errorf("expected 12345, got %d", result)
}
})
t.Run("value at math.MaxInt64 returns math.MaxInt64", func(t *testing.T) {
result := clampUint64ToInt64(uint64(math.MaxInt64))
if result != math.MaxInt64 {
t.Errorf("expected %d, got %d", int64(math.MaxInt64), result)
}
})
t.Run("value at math.MaxInt64 + 1 clamps to math.MaxInt64", func(t *testing.T) {
result := clampUint64ToInt64(uint64(math.MaxInt64) + 1)
if result != math.MaxInt64 {
t.Errorf("expected %d, got %d", int64(math.MaxInt64), result)
}
})
t.Run("value at math.MaxUint64 clamps to math.MaxInt64", func(t *testing.T) {
result := clampUint64ToInt64(math.MaxUint64)
if result != math.MaxInt64 {
t.Errorf("expected %d, got %d", int64(math.MaxInt64), result)
}
})
}
func TestRemoveFailedPBSNode(t *testing.T) {
t.Run("removes correct instance from PBSInstances", func(t *testing.T) {
state := models.NewState()
state.UpdatePBSInstances([]models.PBSInstance{
{Name: "pbs1", Host: "192.168.1.1"},
{Name: "pbs2", Host: "192.168.1.2"},
{Name: "pbs3", Host: "192.168.1.3"},
})
m := &Monitor{state: state}
m.removeFailedPBSNode("pbs2")
if len(state.PBSInstances) != 2 {
t.Fatalf("expected 2 instances, got %d", len(state.PBSInstances))
}
for _, inst := range state.PBSInstances {
if inst.Name == "pbs2" {
t.Error("expected pbs2 to be removed")
}
}
// Verify other instances remain
names := make(map[string]bool)
for _, inst := range state.PBSInstances {
names[inst.Name] = true
}
if !names["pbs1"] || !names["pbs3"] {
t.Errorf("expected pbs1 and pbs3 to remain, got %v", names)
}
})
t.Run("clears PBS backups for that instance", func(t *testing.T) {
state := models.NewState()
state.UpdatePBSBackups("pbs1", []models.PBSBackup{
{ID: "backup1", Instance: "pbs1"},
{ID: "backup2", Instance: "pbs1"},
})
state.UpdatePBSBackups("pbs2", []models.PBSBackup{
{ID: "backup3", Instance: "pbs2"},
})
m := &Monitor{state: state}
m.removeFailedPBSNode("pbs1")
// Verify pbs1 backups are gone
for _, backup := range state.PBSBackups {
if backup.Instance == "pbs1" {
t.Errorf("expected pbs1 backups to be cleared, found %s", backup.ID)
}
}
// Verify pbs2 backups remain
found := false
for _, backup := range state.PBSBackups {
if backup.Instance == "pbs2" {
found = true
break
}
}
if !found {
t.Error("expected pbs2 backups to remain")
}
})
t.Run("sets connection health to false", func(t *testing.T) {
state := models.NewState()
state.SetConnectionHealth("pbs-pbs1", true)
state.SetConnectionHealth("pbs-pbs2", true)
m := &Monitor{state: state}
m.removeFailedPBSNode("pbs1")
if state.ConnectionHealth["pbs-pbs1"] != false {
t.Error("expected pbs-pbs1 connection health to be false")
}
if state.ConnectionHealth["pbs-pbs2"] != true {
t.Error("expected pbs-pbs2 connection health to remain true")
}
})
t.Run("handles empty instances list", func(t *testing.T) {
state := models.NewState()
m := &Monitor{state: state}
// Should not panic
m.removeFailedPBSNode("nonexistent")
if len(state.PBSInstances) != 0 {
t.Errorf("expected empty instances, got %d", len(state.PBSInstances))
}
})
t.Run("handles instance not found", func(t *testing.T) {
state := models.NewState()
state.UpdatePBSInstances([]models.PBSInstance{
{Name: "pbs1", Host: "192.168.1.1"},
})
m := &Monitor{state: state}
m.removeFailedPBSNode("nonexistent")
if len(state.PBSInstances) != 1 {
t.Errorf("expected 1 instance to remain, got %d", len(state.PBSInstances))
}
})
}
func TestGetDockerHost(t *testing.T) {
t.Run("empty hostID returns empty host and false", func(t *testing.T) {
state := models.NewState()
state.UpsertDockerHost(models.DockerHost{ID: "host1", Hostname: "docker1"})
m := &Monitor{state: state}
host, found := m.GetDockerHost("")
if found {
t.Error("expected found to be false for empty hostID")
}
if host.ID != "" {
t.Errorf("expected empty host, got ID=%q", host.ID)
}
})
t.Run("whitespace-only hostID returns empty host and false", func(t *testing.T) {
state := models.NewState()
state.UpsertDockerHost(models.DockerHost{ID: "host1", Hostname: "docker1"})
m := &Monitor{state: state}
host, found := m.GetDockerHost(" ")
if found {
t.Error("expected found to be false for whitespace-only hostID")
}
if host.ID != "" {
t.Errorf("expected empty host, got ID=%q", host.ID)
}
})
t.Run("host ID not found returns empty host and false", func(t *testing.T) {
state := models.NewState()
state.UpsertDockerHost(models.DockerHost{ID: "host1", Hostname: "docker1"})
m := &Monitor{state: state}
host, found := m.GetDockerHost("nonexistent")
if found {
t.Error("expected found to be false for nonexistent hostID")
}
if host.ID != "" {
t.Errorf("expected empty host, got ID=%q", host.ID)
}
})
t.Run("host ID found returns the host and true", func(t *testing.T) {
state := models.NewState()
state.UpsertDockerHost(models.DockerHost{ID: "host1", Hostname: "docker1"})
state.UpsertDockerHost(models.DockerHost{ID: "host2", Hostname: "docker2"})
m := &Monitor{state: state}
host, found := m.GetDockerHost("host1")
if !found {
t.Error("expected found to be true")
}
if host.ID != "host1" {
t.Errorf("expected ID='host1', got %q", host.ID)
}
if host.Hostname != "docker1" {
t.Errorf("expected Hostname='docker1', got %q", host.Hostname)
}
})
t.Run("hostID with leading/trailing whitespace is trimmed and found", func(t *testing.T) {
state := models.NewState()
state.UpsertDockerHost(models.DockerHost{ID: "host1", Hostname: "docker1"})
m := &Monitor{state: state}
host, found := m.GetDockerHost(" host1 ")
if !found {
t.Error("expected found to be true after trimming whitespace")
}
if host.ID != "host1" {
t.Errorf("expected ID='host1', got %q", host.ID)
}
if host.Hostname != "docker1" {
t.Errorf("expected Hostname='docker1', got %q", host.Hostname)
}
})
}
func TestRemoveFailedPMGInstance(t *testing.T) {
t.Run("removes correct instance from PMGInstances", func(t *testing.T) {
state := models.NewState()
state.UpdatePMGInstances([]models.PMGInstance{
{Name: "pmg1", Host: "192.168.1.1"},
{Name: "pmg2", Host: "192.168.1.2"},
{Name: "pmg3", Host: "192.168.1.3"},
})
m := &Monitor{state: state}
m.removeFailedPMGInstance("pmg2")
if len(state.PMGInstances) != 2 {
t.Fatalf("expected 2 instances, got %d", len(state.PMGInstances))
}
for _, inst := range state.PMGInstances {
if inst.Name == "pmg2" {
t.Error("expected pmg2 to be removed")
}
}
// Verify other instances remain
names := make(map[string]bool)
for _, inst := range state.PMGInstances {
names[inst.Name] = true
}
if !names["pmg1"] || !names["pmg3"] {
t.Errorf("expected pmg1 and pmg3 to remain, got %v", names)
}
})
t.Run("clears PMG backups for that instance", func(t *testing.T) {
state := models.NewState()
state.UpdatePMGBackups("pmg1", []models.PMGBackup{
{ID: "backup1", Instance: "pmg1"},
{ID: "backup2", Instance: "pmg1"},
})
state.UpdatePMGBackups("pmg2", []models.PMGBackup{
{ID: "backup3", Instance: "pmg2"},
})
m := &Monitor{state: state}
m.removeFailedPMGInstance("pmg1")
// Verify pmg1 backups are gone
for _, backup := range state.PMGBackups {
if backup.Instance == "pmg1" {
t.Errorf("expected pmg1 backups to be cleared, found %s", backup.ID)
}
}
// Verify pmg2 backups remain
found := false
for _, backup := range state.PMGBackups {
if backup.Instance == "pmg2" {
found = true
break
}
}
if !found {
t.Error("expected pmg2 backups to remain")
}
})
t.Run("sets connection health to false", func(t *testing.T) {
state := models.NewState()
state.SetConnectionHealth("pmg-pmg1", true)
state.SetConnectionHealth("pmg-pmg2", true)
m := &Monitor{state: state}
m.removeFailedPMGInstance("pmg1")
if state.ConnectionHealth["pmg-pmg1"] != false {
t.Error("expected pmg-pmg1 connection health to be false")
}
if state.ConnectionHealth["pmg-pmg2"] != true {
t.Error("expected pmg-pmg2 connection health to remain true")
}
})
t.Run("handles empty instances list", func(t *testing.T) {
state := models.NewState()
m := &Monitor{state: state}
// Should not panic
m.removeFailedPMGInstance("nonexistent")
if len(state.PMGInstances) != 0 {
t.Errorf("expected empty instances, got %d", len(state.PMGInstances))
}
})
t.Run("handles instance not found", func(t *testing.T) {
state := models.NewState()
state.UpdatePMGInstances([]models.PMGInstance{
{Name: "pmg1", Host: "192.168.1.1"},
})
m := &Monitor{state: state}
m.removeFailedPMGInstance("nonexistent")
if len(state.PMGInstances) != 1 {
t.Errorf("expected 1 instance to remain, got %d", len(state.PMGInstances))
}
})
}
func TestSchedulerHealth(t *testing.T) {
t.Run("nil config returns Enabled false", func(t *testing.T) {
m := &Monitor{config: nil}
resp := m.SchedulerHealth()
if resp.Enabled {
t.Error("expected Enabled to be false when config is nil")
}
})
t.Run("config with AdaptivePollingEnabled false returns Enabled false", func(t *testing.T) {
m := &Monitor{
config: &config.Config{AdaptivePollingEnabled: false},
}
resp := m.SchedulerHealth()
if resp.Enabled {
t.Error("expected Enabled to be false when AdaptivePollingEnabled is false")
}
})
t.Run("config with AdaptivePollingEnabled true returns Enabled true", func(t *testing.T) {
m := &Monitor{
config: &config.Config{AdaptivePollingEnabled: true},
}
resp := m.SchedulerHealth()
if !resp.Enabled {
t.Error("expected Enabled to be true when AdaptivePollingEnabled is true")
}
})
t.Run("nil taskQueue returns empty Queue", func(t *testing.T) {
m := &Monitor{
config: &config.Config{},
taskQueue: nil,
}
resp := m.SchedulerHealth()
// Queue should be zero value (empty)
if resp.Queue.Depth != 0 {
t.Errorf("expected Queue.Depth to be 0, got %d", resp.Queue.Depth)
}
if len(resp.Queue.PerType) != 0 {
t.Errorf("expected Queue.PerType to be empty, got %d entries", len(resp.Queue.PerType))
}
})
t.Run("non-nil taskQueue returns queue snapshot", func(t *testing.T) {
tq := NewTaskQueue()
tq.Upsert(ScheduledTask{
InstanceType: InstanceTypePVE,
InstanceName: "pve1",
NextRun: time.Now().Add(time.Minute),
})
m := &Monitor{
config: &config.Config{},
taskQueue: tq,
}
resp := m.SchedulerHealth()
if resp.Queue.Depth != 1 {
t.Errorf("expected Queue.Depth to be 1, got %d", resp.Queue.Depth)
}
})
t.Run("nil deadLetterQueue returns empty DeadLetter", func(t *testing.T) {
m := &Monitor{
config: &config.Config{},
deadLetterQueue: nil,
}
resp := m.SchedulerHealth()
if resp.DeadLetter.Count != 0 {
t.Errorf("expected DeadLetter.Count to be 0, got %d", resp.DeadLetter.Count)
}
if len(resp.DeadLetter.Tasks) != 0 {
t.Errorf("expected DeadLetter.Tasks to be empty, got %d tasks", len(resp.DeadLetter.Tasks))
}
})
t.Run("non-nil deadLetterQueue returns dead letter snapshot", func(t *testing.T) {
dlq := NewTaskQueue()
dlq.Upsert(ScheduledTask{
InstanceType: InstanceTypePVE,
InstanceName: "failed-pve",
NextRun: time.Now(),
})
m := &Monitor{
config: &config.Config{},
deadLetterQueue: dlq,
lastOutcome: make(map[string]taskOutcome),
failureCounts: make(map[string]int),
}
resp := m.SchedulerHealth()
if resp.DeadLetter.Count != 1 {
t.Errorf("expected DeadLetter.Count to be 1, got %d", resp.DeadLetter.Count)
}
})
t.Run("circuit breaker key with :: separator extracts type and name", func(t *testing.T) {
breaker := newCircuitBreaker(3, 5*time.Second, 5*time.Minute, 30*time.Second)
// Record a failure to make the breaker appear in the response
breaker.recordFailure(time.Now())
m := &Monitor{
config: &config.Config{},
circuitBreakers: map[string]*circuitBreaker{
"pve::my-node": breaker,
},
}
resp := m.SchedulerHealth()
if len(resp.Breakers) != 1 {
t.Fatalf("expected 1 breaker, got %d", len(resp.Breakers))
}
if resp.Breakers[0].Type != "pve" {
t.Errorf("expected breaker Type to be 'pve', got %q", resp.Breakers[0].Type)
}
if resp.Breakers[0].Instance != "my-node" {
t.Errorf("expected breaker Instance to be 'my-node', got %q", resp.Breakers[0].Instance)
}
})
t.Run("circuit breaker key without :: separator uses unknown type", func(t *testing.T) {
breaker := newCircuitBreaker(3, 5*time.Second, 5*time.Minute, 30*time.Second)
breaker.recordFailure(time.Now())
m := &Monitor{
config: &config.Config{},
circuitBreakers: map[string]*circuitBreaker{
"legacy-key-no-separator": breaker,
},
}
resp := m.SchedulerHealth()
if len(resp.Breakers) != 1 {
t.Fatalf("expected 1 breaker, got %d", len(resp.Breakers))
}
if resp.Breakers[0].Type != "unknown" {
t.Errorf("expected breaker Type to be 'unknown', got %q", resp.Breakers[0].Type)
}
if resp.Breakers[0].Instance != "legacy-key-no-separator" {
t.Errorf("expected breaker Instance to be 'legacy-key-no-separator', got %q", resp.Breakers[0].Instance)
}
})
t.Run("circuit breaker in closed state with 0 failures is skipped", func(t *testing.T) {
// A freshly created breaker is closed with 0 failures
breaker := newCircuitBreaker(3, 5*time.Second, 5*time.Minute, 30*time.Second)
m := &Monitor{
config: &config.Config{},
circuitBreakers: map[string]*circuitBreaker{
"pve::healthy-node": breaker,
},
}
resp := m.SchedulerHealth()
if len(resp.Breakers) != 0 {
t.Errorf("expected 0 breakers (closed with 0 failures should be skipped), got %d", len(resp.Breakers))
}
})
t.Run("open breaker is included regardless of failure count", func(t *testing.T) {
breaker := newCircuitBreaker(1, 5*time.Second, 5*time.Minute, 30*time.Second)
// Trip the breaker open by recording enough failures
breaker.recordFailure(time.Now())
m := &Monitor{
config: &config.Config{},
circuitBreakers: map[string]*circuitBreaker{
"pbs::failed-backup": breaker,
},
}
resp := m.SchedulerHealth()
if len(resp.Breakers) != 1 {
t.Fatalf("expected 1 breaker, got %d", len(resp.Breakers))
}
if resp.Breakers[0].State != "open" {
t.Errorf("expected breaker State to be 'open', got %q", resp.Breakers[0].State)
}
})
t.Run("multiple breakers with mixed states", func(t *testing.T) {
healthyBreaker := newCircuitBreaker(3, 5*time.Second, 5*time.Minute, 30*time.Second)
failingBreaker := newCircuitBreaker(3, 5*time.Second, 5*time.Minute, 30*time.Second)
failingBreaker.recordFailure(time.Now())
tripBreaker := newCircuitBreaker(1, 5*time.Second, 5*time.Minute, 30*time.Second)
tripBreaker.recordFailure(time.Now())
m := &Monitor{
config: &config.Config{},
circuitBreakers: map[string]*circuitBreaker{
"pve::healthy": healthyBreaker,
"pve::failing": failingBreaker,
"pbs::tripped": tripBreaker,
"legacy-no-colon": failingBreaker, // shares same breaker but different key
},
}
resp := m.SchedulerHealth()
// healthyBreaker (closed, 0 failures) should be excluded
// failingBreaker (closed, 1 failure) should be included twice (pve::failing and legacy-no-colon)
// tripBreaker (open, 1 failure) should be included
if len(resp.Breakers) != 3 {
t.Errorf("expected 3 breakers (excluding healthy), got %d", len(resp.Breakers))
}
})
t.Run("UpdatedAt is set to current time", func(t *testing.T) {
before := time.Now()
m := &Monitor{config: &config.Config{}}
resp := m.SchedulerHealth()
after := time.Now()
if resp.UpdatedAt.Before(before) || resp.UpdatedAt.After(after) {
t.Errorf("expected UpdatedAt between %v and %v, got %v", before, after, resp.UpdatedAt)
}
})
}
func TestConvertDockerSwarmInfo(t *testing.T) {
tests := []struct {
name string
input *agentsdocker.SwarmInfo
expected *models.DockerSwarmInfo
}{
{
name: "nil input returns nil",
input: nil,
expected: nil,
},
{
name: "empty struct returns empty struct",
input: &agentsdocker.SwarmInfo{},
expected: &models.DockerSwarmInfo{},
},
{
name: "all fields populated",
input: &agentsdocker.SwarmInfo{
NodeID: "node-abc123",
NodeRole: "manager",
LocalState: "active",
ControlAvailable: true,
ClusterID: "cluster-xyz789",
ClusterName: "my-swarm",
Scope: "swarm",
Error: "",
},
expected: &models.DockerSwarmInfo{
NodeID: "node-abc123",
NodeRole: "manager",
LocalState: "active",
ControlAvailable: true,
ClusterID: "cluster-xyz789",
ClusterName: "my-swarm",
Scope: "swarm",
Error: "",
},
},
{
name: "worker node with error",
input: &agentsdocker.SwarmInfo{
NodeID: "node-worker1",
NodeRole: "worker",
LocalState: "pending",
ControlAvailable: false,
ClusterID: "",
ClusterName: "",
Scope: "local",
Error: "connection refused",
},
expected: &models.DockerSwarmInfo{
NodeID: "node-worker1",
NodeRole: "worker",
LocalState: "pending",
ControlAvailable: false,
ClusterID: "",
ClusterName: "",
Scope: "local",
Error: "connection refused",
},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
result := convertDockerSwarmInfo(tt.input)
if tt.expected == nil {
if result != nil {
t.Errorf("expected nil, got %+v", result)
}
return
}
if result == nil {
t.Fatal("expected non-nil result")
}
if result.NodeID != tt.expected.NodeID {
t.Errorf("NodeID: expected %q, got %q", tt.expected.NodeID, result.NodeID)
}
if result.NodeRole != tt.expected.NodeRole {
t.Errorf("NodeRole: expected %q, got %q", tt.expected.NodeRole, result.NodeRole)
}
if result.LocalState != tt.expected.LocalState {
t.Errorf("LocalState: expected %q, got %q", tt.expected.LocalState, result.LocalState)
}
if result.ControlAvailable != tt.expected.ControlAvailable {
t.Errorf("ControlAvailable: expected %v, got %v", tt.expected.ControlAvailable, result.ControlAvailable)
}
if result.ClusterID != tt.expected.ClusterID {
t.Errorf("ClusterID: expected %q, got %q", tt.expected.ClusterID, result.ClusterID)
}
if result.ClusterName != tt.expected.ClusterName {
t.Errorf("ClusterName: expected %q, got %q", tt.expected.ClusterName, result.ClusterName)
}
if result.Scope != tt.expected.Scope {
t.Errorf("Scope: expected %q, got %q", tt.expected.Scope, result.Scope)
}
if result.Error != tt.expected.Error {
t.Errorf("Error: expected %q, got %q", tt.expected.Error, result.Error)
}
})
}
}