cri-o/server/utils_test.go
Álex González adf249e283 Add extra info to verbose requests to PodSandboxStatus
If PodSandboxStatusRequest.Verbose is true now we are returning the cri-o
version in a JSON object for debug purposes. In the future extra information
(to be defined) should be added to the response

In order to avoid problems when we execute the tests in parallel the fixtures
for new test sandbox and container are creating their own random IDs and
returning them in case you need to refer to them.

Finally, "make testunit" is being run as root to solve a problem with a `chown`
that couldn't be performed otherwise.

This commit closes #1144

Signed-off-by: Álex González <agonzalezro@gmail.com>
2018-03-08 09:59:23 +01:00

149 lines
3.2 KiB
Go

package server
import (
"io/ioutil"
"os"
"testing"
"github.com/opencontainers/image-spec/specs-go/v1"
pb "k8s.io/kubernetes/pkg/kubelet/apis/cri/runtime/v1alpha2"
)
const (
defaultDNSPath = "/etc/resolv.conf"
testDNSPath = "fixtures/resolv_test.conf"
dnsPath = "fixtures/resolv.conf"
)
func must(t *testing.T, err error) {
if err != nil {
t.Error(err)
}
}
func TestParseDNSOptions(t *testing.T) {
testCases := []struct {
Servers, Searches, Options []string
Path string
Want string
}{
{
[]string{},
[]string{},
[]string{},
testDNSPath, defaultDNSPath,
},
{
[]string{"cri-o.io", "github.com"},
[]string{"192.30.253.113", "192.30.252.153"},
[]string{"timeout:5", "attempts:3"},
testDNSPath, dnsPath,
},
}
for _, c := range testCases {
if err := parseDNSOptions(c.Servers, c.Searches,
c.Options, c.Path); err != nil {
t.Error(err)
}
expect, _ := ioutil.ReadFile(c.Want)
result, _ := ioutil.ReadFile(c.Path)
if string(expect) != string(result) {
t.Errorf("expect %v: \n but got : %v", string(expect), string(result))
}
os.Remove(c.Path)
}
}
func TestSysctlsFromPodAnnotations(t *testing.T) {
testCases := []struct {
Annotations map[string]string
SafeSysctls []Sysctl
UnsafeSysctls []Sysctl
}{
{
map[string]string{
"foo-": "bar",
SysctlsPodAnnotationKey: "kernel.shmmax=100000000,safe=20000000",
},
[]Sysctl{
{"kernel.shmmax", "100000000"},
{"safe", "20000000"},
},
[]Sysctl{},
},
{
map[string]string{
UnsafeSysctlsPodAnnotationKey: "kernel.shmmax=10,unsafe=20",
},
[]Sysctl{},
[]Sysctl{
{"kernel.shmmax", "10"},
{"unsafe", "20"},
},
},
{
map[string]string{
"bar..": "42",
SysctlsPodAnnotationKey: "kernel.shmmax=20000000,safe=40000000",
UnsafeSysctlsPodAnnotationKey: "kernel.shmmax=10,unsafe=20",
},
[]Sysctl{
{"kernel.shmmax", "20000000"},
{"safe", "40000000"},
},
[]Sysctl{
{"kernel.shmmax", "10"},
{"unsafe", "20"},
},
},
}
for _, c := range testCases {
safe, unsafe, err := SysctlsFromPodAnnotations(c.Annotations)
if err != nil {
t.Error(err)
}
for index, sysctl := range safe {
if sysctl.Name != safe[index].Name || sysctl.Value != safe[index].Value {
t.Errorf("Expect safe: %v, but got: %v\n", safe[index], sysctl)
}
}
for index, sysctl := range unsafe {
if sysctl.Name != unsafe[index].Name || sysctl.Value != unsafe[index].Value {
t.Errorf("Expect unsafe: %v, but got: %v\n", safe[index], sysctl)
}
}
}
}
func TestMergeEnvs(t *testing.T) {
configImage := &v1.Image{
Config: v1.ImageConfig{
Env: []string{"VAR1=1", "VAR2=2"},
},
}
configKube := []*pb.KeyValue{
{
Key: "VAR2",
Value: "3",
},
{
Key: "VAR3",
Value: "3",
},
}
mergedEnvs := mergeEnvs(configImage, configKube)
if len(mergedEnvs) != 3 {
t.Fatalf("Expected 3 env var, VAR1=1, VAR2=3 and VAR3=3, found %d", len(mergedEnvs))
}
for _, env := range mergedEnvs {
if env != "VAR1=1" && env != "VAR2=3" && env != "VAR3=3" {
t.Fatalf("Expected VAR1=1 or VAR2=3 or VAR3=3, found %s", env)
}
}
}