mirror of
https://github.com/kata-containers/kata-containers.git
synced 2025-10-10 00:23:54 +00:00
Modify some path variables to be functions that return the path with the rootless directory prefix if running rootlessly. Fixes: #1827 Signed-off-by: Gabi Beyer <gabrielle.n.beyer@intel.com>
260 lines
5.3 KiB
Go
260 lines
5.3 KiB
Go
// Copyright (c) 2019 Intel Corporation
|
|
//
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
//
|
|
|
|
package virtcontainers
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
"testing"
|
|
|
|
"github.com/kata-containers/runtime/virtcontainers/device/config"
|
|
"github.com/kata-containers/runtime/virtcontainers/store"
|
|
"github.com/kata-containers/runtime/virtcontainers/types"
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func newAcrnConfig() HypervisorConfig {
|
|
return HypervisorConfig{
|
|
KernelPath: testAcrnKernelPath,
|
|
ImagePath: testAcrnImagePath,
|
|
HypervisorPath: testAcrnPath,
|
|
HypervisorCtlPath: testAcrnCtlPath,
|
|
NumVCPUs: defaultVCPUs,
|
|
MemorySize: defaultMemSzMiB,
|
|
BlockDeviceDriver: config.VirtioBlock,
|
|
DefaultBridges: defaultBridges,
|
|
DefaultMaxVCPUs: MaxAcrnVCPUs(),
|
|
// Adding this here, as hypervisorconfig.valid()
|
|
// forcefully adds it even when 9pfs is not supported
|
|
Msize9p: defaultMsize9p,
|
|
}
|
|
}
|
|
|
|
func testAcrnKernelParameters(t *testing.T, kernelParams []Param, debug bool) {
|
|
assert := assert.New(t)
|
|
acrnConfig := newAcrnConfig()
|
|
acrnConfig.KernelParams = kernelParams
|
|
|
|
if debug == true {
|
|
acrnConfig.Debug = true
|
|
}
|
|
|
|
a := &acrn{
|
|
config: acrnConfig,
|
|
arch: &acrnArchBase{},
|
|
}
|
|
|
|
expected := fmt.Sprintf("panic=1 maxcpus=%d foo=foo bar=bar", a.config.NumVCPUs)
|
|
|
|
params := a.kernelParameters()
|
|
assert.Equal(params, expected)
|
|
}
|
|
|
|
func TestAcrnKernelParameters(t *testing.T) {
|
|
params := []Param{
|
|
{
|
|
Key: "foo",
|
|
Value: "foo",
|
|
},
|
|
{
|
|
Key: "bar",
|
|
Value: "bar",
|
|
},
|
|
}
|
|
|
|
testAcrnKernelParameters(t, params, true)
|
|
testAcrnKernelParameters(t, params, false)
|
|
}
|
|
|
|
func TestAcrnCapabilities(t *testing.T) {
|
|
assert := assert.New(t)
|
|
a := &acrn{
|
|
ctx: context.Background(),
|
|
arch: &acrnArchBase{},
|
|
}
|
|
|
|
caps := a.capabilities()
|
|
assert.True(caps.IsBlockDeviceSupported())
|
|
assert.True(caps.IsBlockDeviceHotplugSupported())
|
|
}
|
|
|
|
func testAcrnAddDevice(t *testing.T, devInfo interface{}, devType deviceType, expected []Device) {
|
|
assert := assert.New(t)
|
|
a := &acrn{
|
|
ctx: context.Background(),
|
|
arch: &acrnArchBase{},
|
|
}
|
|
|
|
err := a.addDevice(devInfo, devType)
|
|
assert.NoError(err)
|
|
assert.Exactly(a.acrnConfig.Devices, expected)
|
|
}
|
|
|
|
func TestAcrnAddDeviceSerialPortDev(t *testing.T) {
|
|
name := "serial.test"
|
|
hostPath := "/tmp/serial.sock"
|
|
|
|
expectedOut := []Device{
|
|
ConsoleDevice{
|
|
Name: name,
|
|
Backend: Socket,
|
|
PortType: SerialBE,
|
|
Path: hostPath,
|
|
},
|
|
}
|
|
|
|
socket := types.Socket{
|
|
HostPath: hostPath,
|
|
Name: name,
|
|
}
|
|
|
|
testAcrnAddDevice(t, socket, serialPortDev, expectedOut)
|
|
}
|
|
|
|
func TestAcrnAddDeviceBlockDev(t *testing.T) {
|
|
path := "/tmp/test.img"
|
|
index := 1
|
|
|
|
expectedOut := []Device{
|
|
BlockDevice{
|
|
FilePath: path,
|
|
Index: index,
|
|
},
|
|
}
|
|
|
|
drive := config.BlockDrive{
|
|
File: path,
|
|
Index: index,
|
|
}
|
|
|
|
testAcrnAddDevice(t, drive, blockDev, expectedOut)
|
|
}
|
|
|
|
func TestAcrnHotplugUnsupportedDeviceType(t *testing.T) {
|
|
assert := assert.New(t)
|
|
|
|
acrnConfig := newAcrnConfig()
|
|
a := &acrn{
|
|
ctx: context.Background(),
|
|
id: "acrnTest",
|
|
config: acrnConfig,
|
|
}
|
|
|
|
_, err := a.hotplugAddDevice(&memoryDevice{0, 128, uint64(0), false}, fsDev)
|
|
assert.Error(err)
|
|
}
|
|
|
|
func TestAcrnUpdateBlockDeviceInvalidPath(t *testing.T) {
|
|
assert := assert.New(t)
|
|
|
|
path := ""
|
|
index := 1
|
|
|
|
acrnConfig := newAcrnConfig()
|
|
a := &acrn{
|
|
ctx: context.Background(),
|
|
id: "acrnBlkTest",
|
|
config: acrnConfig,
|
|
}
|
|
|
|
drive := &config.BlockDrive{
|
|
File: path,
|
|
Index: index,
|
|
}
|
|
|
|
err := a.updateBlockDevice(drive)
|
|
assert.Error(err)
|
|
}
|
|
|
|
func TestAcrnUpdateBlockDeviceInvalidIdx(t *testing.T) {
|
|
assert := assert.New(t)
|
|
|
|
path := "/tmp/test.img"
|
|
index := AcrnBlkDevPoolSz + 1
|
|
|
|
acrnConfig := newAcrnConfig()
|
|
a := &acrn{
|
|
ctx: context.Background(),
|
|
id: "acrnBlkTest",
|
|
config: acrnConfig,
|
|
}
|
|
|
|
drive := &config.BlockDrive{
|
|
File: path,
|
|
Index: index,
|
|
}
|
|
|
|
err := a.updateBlockDevice(drive)
|
|
assert.Error(err)
|
|
}
|
|
|
|
func TestAcrnGetSandboxConsole(t *testing.T) {
|
|
assert := assert.New(t)
|
|
a := &acrn{
|
|
ctx: context.Background(),
|
|
}
|
|
sandboxID := "testSandboxID"
|
|
expected := filepath.Join(store.RunVMStoragePath(), sandboxID, consoleSocket)
|
|
|
|
result, err := a.getSandboxConsole(sandboxID)
|
|
assert.NoError(err)
|
|
assert.Equal(result, expected)
|
|
}
|
|
|
|
func TestAcrnCreateSandbox(t *testing.T) {
|
|
assert := assert.New(t)
|
|
acrnConfig := newAcrnConfig()
|
|
a := &acrn{}
|
|
|
|
sandbox := &Sandbox{
|
|
ctx: context.Background(),
|
|
id: "testSandbox",
|
|
config: &SandboxConfig{
|
|
HypervisorConfig: acrnConfig,
|
|
},
|
|
}
|
|
|
|
vcStore, err := store.NewVCSandboxStore(sandbox.ctx, sandbox.id)
|
|
assert.NoError(err)
|
|
sandbox.store = vcStore
|
|
|
|
err = globalSandboxList.addSandbox(sandbox)
|
|
assert.NoError(err)
|
|
|
|
defer globalSandboxList.removeSandbox(sandbox.id)
|
|
|
|
// Create the hypervisor fake binary
|
|
testAcrnPath := filepath.Join(testDir, testHypervisor)
|
|
_, err = os.Create(testAcrnPath)
|
|
assert.NoError(err)
|
|
|
|
err = a.createSandbox(context.Background(), sandbox.id, NetworkNamespace{}, &sandbox.config.HypervisorConfig, sandbox.store)
|
|
assert.NoError(err)
|
|
assert.Exactly(acrnConfig, a.config)
|
|
}
|
|
|
|
func TestAcrnMemoryTopology(t *testing.T) {
|
|
mem := uint32(1000)
|
|
assert := assert.New(t)
|
|
|
|
a := &acrn{
|
|
arch: &acrnArchBase{},
|
|
config: HypervisorConfig{
|
|
MemorySize: mem,
|
|
},
|
|
}
|
|
|
|
expectedOut := Memory{
|
|
Size: fmt.Sprintf("%dM", mem),
|
|
}
|
|
|
|
memory, err := a.memoryTopology()
|
|
assert.NoError(err)
|
|
assert.Exactly(memory, expectedOut)
|
|
}
|