1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96
|
package generate_test
import (
"io/ioutil"
"os"
"path/filepath"
"runtime"
"testing"
rfc2119 "github.com/opencontainers/runtime-tools/error"
"github.com/opencontainers/runtime-tools/generate"
"github.com/opencontainers/runtime-tools/specerror"
"github.com/opencontainers/runtime-tools/validate"
)
// Smoke test to ensure that _at the very least_ our default configuration
// passes the validation tests. If this test fails, something is _very_ wrong
// and needs to be fixed immediately (as it will break downstreams that depend
// on us for a "sane default" and do compliance testing -- such as umoci).
func TestGenerateValid(t *testing.T) {
t.Skip("DM - skipping network test")
plat := "linux"
if runtime.GOOS == "windows" {
plat = "windows"
}
isolations := []string{"process", "hyperv"}
for _, isolation := range isolations {
if plat == "linux" && isolation == "hyperv" {
// Combination doesn't make sense.
continue
}
bundle, err := ioutil.TempDir("", "TestGenerateValid_bundle")
if err != nil {
t.Fatal(err)
}
defer os.RemoveAll(bundle)
// Create our toy bundle.
rootfsPath := filepath.Join(bundle, "rootfs")
if err := os.Mkdir(rootfsPath, 0755); err != nil {
t.Fatal(err)
}
configPath := filepath.Join(bundle, "config.json")
g, err := generate.New(plat)
if err != nil {
t.Fatal(err)
}
if runtime.GOOS == "windows" {
g.AddWindowsLayerFolders("C:\\fakelayer")
g.AddWindowsLayerFolders("C:\\fakescratch")
if isolation == "process" {
// Add the Rootfs section (note: fake volume guid)
g.SetRootPath("\\\\?\\Volume{ec84d99e-3f02-11e7-ac6c-00155d7682cf}\\")
} else {
// Add the Hyper-V section
g.SetWindowsHypervUntilityVMPath("")
}
}
if err := (&g).SaveToFile(configPath, generate.ExportOptions{Seccomp: false}); err != nil {
t.Fatal(err)
}
// Validate the bundle.
v, err := validate.NewValidatorFromPath(bundle, true, runtime.GOOS)
if err != nil {
t.Errorf("unexpected NewValidatorFromPath error: %+v", err)
}
if err := v.CheckAll(); err != nil {
levelErrors, err := specerror.SplitLevel(err, rfc2119.Must)
if err != nil {
t.Errorf("unexpected non-multierror: %+v", err)
return
}
for _, e := range levelErrors.Warnings {
t.Logf("unexpected warning: %v", e)
}
if err := levelErrors.Error; err != nil {
t.Errorf("unexpected MUST error(s): %+v", err)
}
}
}
}
func TestRemoveMount(t *testing.T) {
g, err := generate.New("linux")
if err != nil {
t.Fatal(err)
}
size := len(g.Mounts())
g.RemoveMount("/dev/shm")
if size-1 != len(g.Mounts()) {
t.Errorf("Unable to remove /dev/shm from mounts")
}
}
|