test: enable tests in Travis
Signed-off-by: Antonio Murdaca <runcom@redhat.com>
This commit is contained in:
parent
25d40b6927
commit
5d86f1f110
6 changed files with 0 additions and 185 deletions
|
@ -9,11 +9,6 @@ function teardown() {
|
||||||
# 1. test running with loading the default apparmor profile.
|
# 1. test running with loading the default apparmor profile.
|
||||||
# test that we can run with the default apparmor profile which will not block touching a file in `.`
|
# test that we can run with the default apparmor profile which will not block touching a file in `.`
|
||||||
@test "load default apparmor profile and run a container with it" {
|
@test "load default apparmor profile and run a container with it" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# this test requires apparmor, so skip this test if apparmor is not enabled.
|
# this test requires apparmor, so skip this test if apparmor is not enabled.
|
||||||
enabled=$(is_apparmor_enabled)
|
enabled=$(is_apparmor_enabled)
|
||||||
if [[ "$enabled" -eq 0 ]]; then
|
if [[ "$enabled" -eq 0 ]]; then
|
||||||
|
@ -46,11 +41,6 @@ function teardown() {
|
||||||
# 2. test running with loading a specific apparmor profile as ocid default apparmor profile.
|
# 2. test running with loading a specific apparmor profile as ocid default apparmor profile.
|
||||||
# test that we can run with a specific apparmor profile which will block touching a file in `.` as ocid default apparmor profile.
|
# test that we can run with a specific apparmor profile which will block touching a file in `.` as ocid default apparmor profile.
|
||||||
@test "load a specific apparmor profile as default apparmor and run a container with it" {
|
@test "load a specific apparmor profile as default apparmor and run a container with it" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# this test requires apparmor, so skip this test if apparmor is not enabled.
|
# this test requires apparmor, so skip this test if apparmor is not enabled.
|
||||||
enabled=$(is_apparmor_enabled)
|
enabled=$(is_apparmor_enabled)
|
||||||
if [[ "$enabled" -eq 0 ]]; then
|
if [[ "$enabled" -eq 0 ]]; then
|
||||||
|
@ -85,11 +75,6 @@ function teardown() {
|
||||||
# 3. test running with loading a specific apparmor profile but not as ocid default apparmor profile.
|
# 3. test running with loading a specific apparmor profile but not as ocid default apparmor profile.
|
||||||
# test that we can run with a specific apparmor profile which will block touching a file in `.`
|
# test that we can run with a specific apparmor profile which will block touching a file in `.`
|
||||||
@test "load default apparmor profile and run a container with another apparmor profile" {
|
@test "load default apparmor profile and run a container with another apparmor profile" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# this test requires apparmor, so skip this test if apparmor is not enabled.
|
# this test requires apparmor, so skip this test if apparmor is not enabled.
|
||||||
enabled=$(is_apparmor_enabled)
|
enabled=$(is_apparmor_enabled)
|
||||||
if [[ "$enabled" -eq 0 ]]; then
|
if [[ "$enabled" -eq 0 ]]; then
|
||||||
|
@ -124,11 +109,6 @@ function teardown() {
|
||||||
# 4. test running with wrong apparmor profile name.
|
# 4. test running with wrong apparmor profile name.
|
||||||
# test that we can will fail when running a ctr with rong apparmor profile name.
|
# test that we can will fail when running a ctr with rong apparmor profile name.
|
||||||
@test "run a container with wrong apparmor profile name" {
|
@test "run a container with wrong apparmor profile name" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# this test requires apparmor, so skip this test if apparmor is not enabled.
|
# this test requires apparmor, so skip this test if apparmor is not enabled.
|
||||||
enabled=$(is_apparmor_enabled)
|
enabled=$(is_apparmor_enabled)
|
||||||
if [[ "$enabled" -eq 0 ]]; then
|
if [[ "$enabled" -eq 0 ]]; then
|
||||||
|
@ -157,11 +137,6 @@ function teardown() {
|
||||||
# 5. test running with default apparmor profile unloaded.
|
# 5. test running with default apparmor profile unloaded.
|
||||||
# test that we can will fail when running a ctr with rong apparmor profile name.
|
# test that we can will fail when running a ctr with rong apparmor profile name.
|
||||||
@test "run a container after unloading default apparmor profile" {
|
@test "run a container after unloading default apparmor profile" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# this test requires apparmor, so skip this test if apparmor is not enabled.
|
# this test requires apparmor, so skip this test if apparmor is not enabled.
|
||||||
enabled=$(is_apparmor_enabled)
|
enabled=$(is_apparmor_enabled)
|
||||||
if [[ "$enabled" -eq 0 ]]; then
|
if [[ "$enabled" -eq 0 ]]; then
|
||||||
|
|
|
@ -7,11 +7,6 @@ function teardown() {
|
||||||
}
|
}
|
||||||
|
|
||||||
@test "ctr remove" {
|
@test "ctr remove" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
start_ocid
|
start_ocid
|
||||||
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
||||||
echo "$output"
|
echo "$output"
|
||||||
|
@ -39,11 +34,6 @@ function teardown() {
|
||||||
}
|
}
|
||||||
|
|
||||||
@test "ctr lifecycle" {
|
@test "ctr lifecycle" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
start_ocid
|
start_ocid
|
||||||
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
||||||
echo "$output"
|
echo "$output"
|
||||||
|
@ -111,11 +101,6 @@ function teardown() {
|
||||||
|
|
||||||
# regression test for #127
|
# regression test for #127
|
||||||
@test "ctrs status for a pod" {
|
@test "ctrs status for a pod" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
start_ocid
|
start_ocid
|
||||||
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
||||||
echo "$output"
|
echo "$output"
|
||||||
|
@ -143,11 +128,6 @@ function teardown() {
|
||||||
}
|
}
|
||||||
|
|
||||||
@test "ctr list filtering" {
|
@test "ctr list filtering" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
start_ocid
|
start_ocid
|
||||||
run ocic pod run --config "$TESTDATA"/sandbox_config.json --name pod1
|
run ocic pod run --config "$TESTDATA"/sandbox_config.json --name pod1
|
||||||
echo "$output"
|
echo "$output"
|
||||||
|
@ -246,11 +226,6 @@ function teardown() {
|
||||||
}
|
}
|
||||||
|
|
||||||
@test "ctr list label filtering" {
|
@test "ctr list label filtering" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
start_ocid
|
start_ocid
|
||||||
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
||||||
echo "$output"
|
echo "$output"
|
||||||
|
@ -299,11 +274,6 @@ function teardown() {
|
||||||
}
|
}
|
||||||
|
|
||||||
@test "ctr metadata in list & status" {
|
@test "ctr metadata in list & status" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
start_ocid
|
start_ocid
|
||||||
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
||||||
echo "$output"
|
echo "$output"
|
||||||
|
@ -334,11 +304,6 @@ function teardown() {
|
||||||
}
|
}
|
||||||
|
|
||||||
@test "ctr execsync" {
|
@test "ctr execsync" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
start_ocid
|
start_ocid
|
||||||
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
||||||
echo "$output"
|
echo "$output"
|
||||||
|
@ -367,11 +332,6 @@ function teardown() {
|
||||||
}
|
}
|
||||||
|
|
||||||
@test "ctr execsync failure" {
|
@test "ctr execsync failure" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
start_ocid
|
start_ocid
|
||||||
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
||||||
echo "$output"
|
echo "$output"
|
||||||
|
@ -394,11 +354,6 @@ function teardown() {
|
||||||
}
|
}
|
||||||
|
|
||||||
@test "ctr stop idempotent" {
|
@test "ctr stop idempotent" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
start_ocid
|
start_ocid
|
||||||
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
||||||
echo "$output"
|
echo "$output"
|
||||||
|
|
|
@ -3,11 +3,6 @@
|
||||||
load helpers
|
load helpers
|
||||||
|
|
||||||
@test "Check for valid pod netns CIDR" {
|
@test "Check for valid pod netns CIDR" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
if [ ! -f "$OCID_CNI_PLUGIN/bridge" ]; then
|
if [ ! -f "$OCID_CNI_PLUGIN/bridge" ]; then
|
||||||
skip "missing CNI bridge plugin, please install it"
|
skip "missing CNI bridge plugin, please install it"
|
||||||
fi
|
fi
|
||||||
|
@ -32,11 +27,6 @@ load helpers
|
||||||
}
|
}
|
||||||
|
|
||||||
@test "Ping pod from the host" {
|
@test "Ping pod from the host" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
if [ ! -f "$OCID_CNI_PLUGIN/bridge" ]; then
|
if [ ! -f "$OCID_CNI_PLUGIN/bridge" ]; then
|
||||||
skip "missing CNI bridge plugin, please install it"
|
skip "missing CNI bridge plugin, please install it"
|
||||||
fi
|
fi
|
||||||
|
@ -61,11 +51,6 @@ load helpers
|
||||||
}
|
}
|
||||||
|
|
||||||
@test "Ping pod from another pod" {
|
@test "Ping pod from another pod" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
if [ ! -f "$OCID_CNI_PLUGIN/bridge" ]; then
|
if [ ! -f "$OCID_CNI_PLUGIN/bridge" ]; then
|
||||||
skip "missing CNI bridge plugin, please install it"
|
skip "missing CNI bridge plugin, please install it"
|
||||||
fi
|
fi
|
||||||
|
|
|
@ -8,11 +8,6 @@ function teardown() {
|
||||||
|
|
||||||
# PR#59
|
# PR#59
|
||||||
@test "pod release name on remove" {
|
@test "pod release name on remove" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
start_ocid
|
start_ocid
|
||||||
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
||||||
echo "$output"
|
echo "$output"
|
||||||
|
@ -41,11 +36,6 @@ function teardown() {
|
||||||
}
|
}
|
||||||
|
|
||||||
@test "pod remove" {
|
@test "pod remove" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
start_ocid
|
start_ocid
|
||||||
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
||||||
echo "$output"
|
echo "$output"
|
||||||
|
@ -67,11 +57,6 @@ function teardown() {
|
||||||
}
|
}
|
||||||
|
|
||||||
@test "pod list filtering" {
|
@test "pod list filtering" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
start_ocid
|
start_ocid
|
||||||
run ocic pod run --config "$TESTDATA"/sandbox_config.json -name pod1 --label "a=b" --label "c=d" --label "e=f"
|
run ocic pod run --config "$TESTDATA"/sandbox_config.json -name pod1 --label "a=b" --label "c=d" --label "e=f"
|
||||||
echo "$output"
|
echo "$output"
|
||||||
|
@ -161,11 +146,6 @@ function teardown() {
|
||||||
}
|
}
|
||||||
|
|
||||||
@test "pod metadata in list & status" {
|
@test "pod metadata in list & status" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
start_ocid
|
start_ocid
|
||||||
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
||||||
echo "$output"
|
echo "$output"
|
||||||
|
@ -195,11 +175,6 @@ function teardown() {
|
||||||
}
|
}
|
||||||
|
|
||||||
@test "pass pod sysctls to runtime" {
|
@test "pass pod sysctls to runtime" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
start_ocid
|
start_ocid
|
||||||
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
||||||
echo "$output"
|
echo "$output"
|
||||||
|
@ -235,11 +210,6 @@ function teardown() {
|
||||||
}
|
}
|
||||||
|
|
||||||
@test "pod stop idempotent" {
|
@test "pod stop idempotent" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
start_ocid
|
start_ocid
|
||||||
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
||||||
echo "$output"
|
echo "$output"
|
||||||
|
@ -258,11 +228,6 @@ function teardown() {
|
||||||
}
|
}
|
||||||
|
|
||||||
@test "pod remove idempotent" {
|
@test "pod remove idempotent" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
start_ocid
|
start_ocid
|
||||||
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
||||||
echo "$output"
|
echo "$output"
|
||||||
|
@ -281,11 +246,6 @@ function teardown() {
|
||||||
}
|
}
|
||||||
|
|
||||||
@test "pod stop idempotent with ctrs already stopped" {
|
@test "pod stop idempotent with ctrs already stopped" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
start_ocid
|
start_ocid
|
||||||
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
||||||
echo "$output"
|
echo "$output"
|
||||||
|
@ -308,11 +268,6 @@ function teardown() {
|
||||||
}
|
}
|
||||||
|
|
||||||
@test "restart ocid and still get pod status" {
|
@test "restart ocid and still get pod status" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
start_ocid
|
start_ocid
|
||||||
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
||||||
echo "$output"
|
echo "$output"
|
||||||
|
|
|
@ -7,11 +7,6 @@ function teardown() {
|
||||||
}
|
}
|
||||||
|
|
||||||
@test "ocid restore" {
|
@test "ocid restore" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
start_ocid
|
start_ocid
|
||||||
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
run ocic pod run --config "$TESTDATA"/sandbox_config.json
|
||||||
echo "$output"
|
echo "$output"
|
||||||
|
|
|
@ -9,11 +9,6 @@ function teardown() {
|
||||||
# 1. test running with ctr unconfined
|
# 1. test running with ctr unconfined
|
||||||
# test that we can run with a syscall which would be otherwise blocked
|
# test that we can run with a syscall which would be otherwise blocked
|
||||||
@test "ctr seccomp profiles unconfined" {
|
@test "ctr seccomp profiles unconfined" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
||||||
enabled=$(is_seccomp_enabled)
|
enabled=$(is_seccomp_enabled)
|
||||||
if [[ "$enabled" -eq 0 ]]; then
|
if [[ "$enabled" -eq 0 ]]; then
|
||||||
|
@ -50,11 +45,6 @@ function teardown() {
|
||||||
# 2. test running with ctr runtime/default
|
# 2. test running with ctr runtime/default
|
||||||
# test that we cannot run with a syscall blocked by the default seccomp profile
|
# test that we cannot run with a syscall blocked by the default seccomp profile
|
||||||
@test "ctr seccomp profiles runtime/default" {
|
@test "ctr seccomp profiles runtime/default" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
||||||
enabled=$(is_seccomp_enabled)
|
enabled=$(is_seccomp_enabled)
|
||||||
if [[ "$enabled" -eq 0 ]]; then
|
if [[ "$enabled" -eq 0 ]]; then
|
||||||
|
@ -91,11 +81,6 @@ function teardown() {
|
||||||
|
|
||||||
# 3. test running with ctr wrong profile name
|
# 3. test running with ctr wrong profile name
|
||||||
@test "ctr seccomp profiles wrong profile name" {
|
@test "ctr seccomp profiles wrong profile name" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
||||||
enabled=$(is_seccomp_enabled)
|
enabled=$(is_seccomp_enabled)
|
||||||
if [[ "$enabled" -eq 0 ]]; then
|
if [[ "$enabled" -eq 0 ]]; then
|
||||||
|
@ -127,11 +112,6 @@ function teardown() {
|
||||||
# TODO(runcom): need https://issues.k8s.io/36997
|
# TODO(runcom): need https://issues.k8s.io/36997
|
||||||
# 4. test running with ctr localhost/profile_name
|
# 4. test running with ctr localhost/profile_name
|
||||||
@test "ctr seccomp profiles localhost/profile_name" {
|
@test "ctr seccomp profiles localhost/profile_name" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
||||||
enabled=$(is_seccomp_enabled)
|
enabled=$(is_seccomp_enabled)
|
||||||
if [[ "$enabled" -eq 0 ]]; then
|
if [[ "$enabled" -eq 0 ]]; then
|
||||||
|
@ -152,11 +132,6 @@ function teardown() {
|
||||||
# pod -> runtime/default
|
# pod -> runtime/default
|
||||||
# result: fail chmod
|
# result: fail chmod
|
||||||
@test "ctr seccomp profiles falls back to pod profile" {
|
@test "ctr seccomp profiles falls back to pod profile" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
||||||
enabled=$(is_seccomp_enabled)
|
enabled=$(is_seccomp_enabled)
|
||||||
if [[ "$enabled" -eq 0 ]]; then
|
if [[ "$enabled" -eq 0 ]]; then
|
||||||
|
@ -196,11 +171,6 @@ function teardown() {
|
||||||
# pod -> NO
|
# pod -> NO
|
||||||
# result: success, running unconfined
|
# result: success, running unconfined
|
||||||
@test "ctr seccomp profiles falls back to unconfined" {
|
@test "ctr seccomp profiles falls back to unconfined" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
||||||
enabled=$(is_seccomp_enabled)
|
enabled=$(is_seccomp_enabled)
|
||||||
if [[ "$enabled" -eq 0 ]]; then
|
if [[ "$enabled" -eq 0 ]]; then
|
||||||
|
@ -237,11 +207,6 @@ function teardown() {
|
||||||
# 1. test running with pod unconfined
|
# 1. test running with pod unconfined
|
||||||
# test that we can run with a syscall which would be otherwise blocked
|
# test that we can run with a syscall which would be otherwise blocked
|
||||||
@test "pod seccomp profiles unconfined" {
|
@test "pod seccomp profiles unconfined" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
||||||
enabled=$(is_seccomp_enabled)
|
enabled=$(is_seccomp_enabled)
|
||||||
if [[ "$enabled" -eq 0 ]]; then
|
if [[ "$enabled" -eq 0 ]]; then
|
||||||
|
@ -278,11 +243,6 @@ function teardown() {
|
||||||
# 2. test running with pod runtime/default
|
# 2. test running with pod runtime/default
|
||||||
# test that we cannot run with a syscall blocked by the default seccomp profile
|
# test that we cannot run with a syscall blocked by the default seccomp profile
|
||||||
@test "pod seccomp profiles runtime/default" {
|
@test "pod seccomp profiles runtime/default" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
||||||
enabled=$(is_seccomp_enabled)
|
enabled=$(is_seccomp_enabled)
|
||||||
if [[ "$enabled" -eq 0 ]]; then
|
if [[ "$enabled" -eq 0 ]]; then
|
||||||
|
@ -319,11 +279,6 @@ function teardown() {
|
||||||
|
|
||||||
# 3. test running with pod wrong profile name
|
# 3. test running with pod wrong profile name
|
||||||
@test "pod seccomp profiles wrong profile name" {
|
@test "pod seccomp profiles wrong profile name" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
||||||
enabled=$(is_seccomp_enabled)
|
enabled=$(is_seccomp_enabled)
|
||||||
if [[ "$enabled" -eq 0 ]]; then
|
if [[ "$enabled" -eq 0 ]]; then
|
||||||
|
@ -356,11 +311,6 @@ function teardown() {
|
||||||
# TODO(runcom): need https://issues.k8s.io/36997
|
# TODO(runcom): need https://issues.k8s.io/36997
|
||||||
# 4. test running with pod localhost/profile_name
|
# 4. test running with pod localhost/profile_name
|
||||||
@test "pod seccomp profiles localhost/profile_name" {
|
@test "pod seccomp profiles localhost/profile_name" {
|
||||||
# this test requires docker, thus it can't yet be run in a container
|
|
||||||
if [ "$TRAVIS" = "true" ]; then # instead of $TRAVIS, add a function is_containerized to skip here
|
|
||||||
skip "cannot yet run this test in a container, use sudo make localintegration"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
# this test requires seccomp, so skip this test if seccomp is not enabled.
|
||||||
enabled=$(is_seccomp_enabled)
|
enabled=$(is_seccomp_enabled)
|
||||||
if [[ "$enabled" -eq 0 ]]; then
|
if [[ "$enabled" -eq 0 ]]; then
|
||||||
|
|
Loading…
Reference in a new issue