 7fc8652e32
			
		
	
	7fc8652e32
	
	
	
		
			
			Along with type(Sandbox or Container) and Sandbox name annotations provide support for additional annotation: - Container name This will help us perform per container operation by comparing it with pass through annotations (eg. pod metadata annotations from K8s) Signed-off-by: Chethan Suresh <Chethan.Suresh@sony.com>
		
			
				
	
	
		
			164 lines
		
	
	
		
			5.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			164 lines
		
	
	
		
			5.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // +build windows
 | |
| 
 | |
| /*
 | |
| Copyright The containerd Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package server
 | |
| 
 | |
| import (
 | |
| 	"testing"
 | |
| 
 | |
| 	imagespec "github.com/opencontainers/image-spec/specs-go/v1"
 | |
| 	runtimespec "github.com/opencontainers/runtime-spec/specs-go"
 | |
| 	"github.com/stretchr/testify/assert"
 | |
| 	runtime "k8s.io/cri-api/pkg/apis/runtime/v1alpha2"
 | |
| 
 | |
| 	"github.com/containerd/cri/pkg/annotations"
 | |
| 	"github.com/containerd/cri/pkg/config"
 | |
| )
 | |
| 
 | |
| func getCreateContainerTestData() (*runtime.ContainerConfig, *runtime.PodSandboxConfig,
 | |
| 	*imagespec.ImageConfig, func(*testing.T, string, string, uint32, *runtimespec.Spec)) {
 | |
| 	config := &runtime.ContainerConfig{
 | |
| 		Metadata: &runtime.ContainerMetadata{
 | |
| 			Name:    "test-name",
 | |
| 			Attempt: 1,
 | |
| 		},
 | |
| 		Image: &runtime.ImageSpec{
 | |
| 			Image: "sha256:c75bebcdd211f41b3a460c7bf82970ed6c75acaab9cd4c9a4e125b03ca113799",
 | |
| 		},
 | |
| 		Command:    []string{"test", "command"},
 | |
| 		Args:       []string{"test", "args"},
 | |
| 		WorkingDir: "test-cwd",
 | |
| 		Envs: []*runtime.KeyValue{
 | |
| 			{Key: "k1", Value: "v1"},
 | |
| 			{Key: "k2", Value: "v2"},
 | |
| 			{Key: "k3", Value: "v3=v3bis"},
 | |
| 			{Key: "k4", Value: "v4=v4bis=foop"},
 | |
| 		},
 | |
| 		Mounts: []*runtime.Mount{
 | |
| 			// everything default
 | |
| 			{
 | |
| 				ContainerPath: "container-path-1",
 | |
| 				HostPath:      "host-path-1",
 | |
| 			},
 | |
| 			// readOnly
 | |
| 			{
 | |
| 				ContainerPath: "container-path-2",
 | |
| 				HostPath:      "host-path-2",
 | |
| 				Readonly:      true,
 | |
| 			},
 | |
| 		},
 | |
| 		Labels:      map[string]string{"a": "b"},
 | |
| 		Annotations: map[string]string{"c": "d"},
 | |
| 		Windows: &runtime.WindowsContainerConfig{
 | |
| 			Resources: &runtime.WindowsContainerResources{
 | |
| 				CpuShares:          100,
 | |
| 				CpuCount:           200,
 | |
| 				CpuMaximum:         300,
 | |
| 				MemoryLimitInBytes: 400,
 | |
| 			},
 | |
| 			SecurityContext: &runtime.WindowsContainerSecurityContext{
 | |
| 				RunAsUsername: "test-user",
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 	sandboxConfig := &runtime.PodSandboxConfig{
 | |
| 		Metadata: &runtime.PodSandboxMetadata{
 | |
| 			Name:      "test-sandbox-name",
 | |
| 			Uid:       "test-sandbox-uid",
 | |
| 			Namespace: "test-sandbox-ns",
 | |
| 			Attempt:   2,
 | |
| 		},
 | |
| 		Hostname:    "test-hostname",
 | |
| 		Annotations: map[string]string{"c": "d"},
 | |
| 	}
 | |
| 	imageConfig := &imagespec.ImageConfig{
 | |
| 		Env:        []string{"ik1=iv1", "ik2=iv2", "ik3=iv3=iv3bis", "ik4=iv4=iv4bis=boop"},
 | |
| 		Entrypoint: []string{"/entrypoint"},
 | |
| 		Cmd:        []string{"cmd"},
 | |
| 		WorkingDir: "/workspace",
 | |
| 	}
 | |
| 	specCheck := func(t *testing.T, id string, sandboxID string, sandboxPid uint32, spec *runtimespec.Spec) {
 | |
| 		assert.Nil(t, spec.Root)
 | |
| 		assert.Equal(t, "test-hostname", spec.Hostname)
 | |
| 		assert.Equal(t, []string{"test", "command", "test", "args"}, spec.Process.Args)
 | |
| 		assert.Equal(t, "test-cwd", spec.Process.Cwd)
 | |
| 		assert.Contains(t, spec.Process.Env, "k1=v1", "k2=v2", "k3=v3=v3bis", "ik4=iv4=iv4bis=boop")
 | |
| 		assert.Contains(t, spec.Process.Env, "ik1=iv1", "ik2=iv2", "ik3=iv3=iv3bis", "k4=v4=v4bis=foop")
 | |
| 
 | |
| 		t.Logf("Check bind mount")
 | |
| 		checkMount(t, spec.Mounts, "host-path-1", "container-path-1", "", []string{"rw"}, nil)
 | |
| 		checkMount(t, spec.Mounts, "host-path-2", "container-path-2", "", []string{"ro"}, nil)
 | |
| 
 | |
| 		t.Logf("Check resource limits")
 | |
| 		assert.EqualValues(t, *spec.Windows.Resources.CPU.Shares, 100)
 | |
| 		assert.EqualValues(t, *spec.Windows.Resources.CPU.Count, 200)
 | |
| 		assert.EqualValues(t, *spec.Windows.Resources.CPU.Maximum, 300)
 | |
| 		assert.EqualValues(t, *spec.Windows.Resources.CPU.Maximum, 300)
 | |
| 		assert.EqualValues(t, *spec.Windows.Resources.Memory.Limit, 400)
 | |
| 
 | |
| 		t.Logf("Check username")
 | |
| 		assert.Contains(t, spec.Process.User.Username, "test-user")
 | |
| 
 | |
| 		t.Logf("Check PodSandbox annotations")
 | |
| 		assert.Contains(t, spec.Annotations, annotations.SandboxID)
 | |
| 		assert.EqualValues(t, spec.Annotations[annotations.SandboxID], sandboxID)
 | |
| 
 | |
| 		assert.Contains(t, spec.Annotations, annotations.ContainerType)
 | |
| 		assert.EqualValues(t, spec.Annotations[annotations.ContainerType], annotations.ContainerTypeContainer)
 | |
| 	}
 | |
| 	return config, sandboxConfig, imageConfig, specCheck
 | |
| }
 | |
| 
 | |
| func TestContainerWindowsNetworkNamespace(t *testing.T) {
 | |
| 	testID := "test-id"
 | |
| 	testSandboxID := "sandbox-id"
 | |
| 	testContainerName := "container-name"
 | |
| 	testPid := uint32(1234)
 | |
| 	nsPath := "test-cni"
 | |
| 	c := newTestCRIService()
 | |
| 
 | |
| 	containerConfig, sandboxConfig, imageConfig, specCheck := getCreateContainerTestData()
 | |
| 	spec, err := c.containerSpec(testID, testSandboxID, testPid, nsPath, testContainerName, containerConfig, sandboxConfig, imageConfig, nil, config.Runtime{})
 | |
| 	assert.NoError(t, err)
 | |
| 	assert.NotNil(t, spec)
 | |
| 	specCheck(t, testID, testSandboxID, testPid, spec)
 | |
| 	assert.NotNil(t, spec.Windows)
 | |
| 	assert.NotNil(t, spec.Windows.Network)
 | |
| 	assert.Equal(t, nsPath, spec.Windows.Network.NetworkNamespace)
 | |
| }
 | |
| 
 | |
| func TestMountCleanPath(t *testing.T) {
 | |
| 	testID := "test-id"
 | |
| 	testSandboxID := "sandbox-id"
 | |
| 	testContainerName := "container-name"
 | |
| 	testPid := uint32(1234)
 | |
| 	nsPath := "test-cni"
 | |
| 	c := newTestCRIService()
 | |
| 
 | |
| 	containerConfig, sandboxConfig, imageConfig, specCheck := getCreateContainerTestData()
 | |
| 	containerConfig.Mounts = append(containerConfig.Mounts, &runtime.Mount{
 | |
| 		ContainerPath: "c:/test/container-path",
 | |
| 		HostPath:      "c:/test/host-path",
 | |
| 	})
 | |
| 	spec, err := c.containerSpec(testID, testSandboxID, testPid, nsPath, testContainerName, containerConfig, sandboxConfig, imageConfig, nil, config.Runtime{})
 | |
| 	assert.NoError(t, err)
 | |
| 	assert.NotNil(t, spec)
 | |
| 	specCheck(t, testID, testSandboxID, testPid, spec)
 | |
| 	checkMount(t, spec.Mounts, "c:\\test\\host-path", "c:\\test\\container-path", "", []string{"rw"}, nil)
 | |
| }
 |