 5847340a7d
			
		
	
	5847340a7d
	
	
	
		
			
			Currently, the cri-integration tests do not work on Windows due to various reasons. One of the reasons is because all the tests are using Linux-specific images. This commit refactors the image pulling / usage in the cri-integration tests, making it easier to update, and easier to configure the a custom registry to pull those images from. For Windows runs, custom registries can be created, which will also contain Windows images, and the cri-integration tests can be configured to use those registries by specifying the "--image-list" argument, a TOML file which will contain an alternative mapping of the default images. Signed-off-by: Claudiu Belu <cbelu@cloudbasesolutions.com>
		
			
				
	
	
		
			141 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			141 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // +build linux
 | |
| 
 | |
| /*
 | |
|    Copyright The containerd Authors.
 | |
| 
 | |
|    Licensed under the Apache License, Version 2.0 (the "License");
 | |
|    you may not use this file except in compliance with the License.
 | |
|    You may obtain a copy of the License at
 | |
| 
 | |
|        http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
|    Unless required by applicable law or agreed to in writing, software
 | |
|    distributed under the License is distributed on an "AS IS" BASIS,
 | |
|    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|    See the License for the specific language governing permissions and
 | |
|    limitations under the License.
 | |
| */
 | |
| 
 | |
| package integration
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"os/exec"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/stretchr/testify/assert"
 | |
| 	"github.com/stretchr/testify/require"
 | |
| 	runtime "k8s.io/cri-api/pkg/apis/runtime/v1alpha2"
 | |
| )
 | |
| 
 | |
| func TestVolumeCopyUp(t *testing.T) {
 | |
| 	var (
 | |
| 		testImage   = GetImage(VolumeCopyUp)
 | |
| 		execTimeout = time.Minute
 | |
| 	)
 | |
| 
 | |
| 	t.Logf("Create a sandbox")
 | |
| 	sbConfig := PodSandboxConfig("sandbox", "volume-copy-up")
 | |
| 	sb, err := runtimeService.RunPodSandbox(sbConfig, *runtimeHandler)
 | |
| 	require.NoError(t, err)
 | |
| 	defer func() {
 | |
| 		assert.NoError(t, runtimeService.StopPodSandbox(sb))
 | |
| 		assert.NoError(t, runtimeService.RemovePodSandbox(sb))
 | |
| 	}()
 | |
| 
 | |
| 	t.Logf("Pull test image")
 | |
| 	_, err = imageService.PullImage(&runtime.ImageSpec{Image: testImage}, nil, sbConfig)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	t.Logf("Create a container with volume-copy-up test image")
 | |
| 	cnConfig := ContainerConfig(
 | |
| 		"container",
 | |
| 		testImage,
 | |
| 		WithCommand("tail", "-f", "/dev/null"),
 | |
| 	)
 | |
| 	cn, err := runtimeService.CreateContainer(sb, cnConfig, sbConfig)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	t.Logf("Start the container")
 | |
| 	require.NoError(t, runtimeService.StartContainer(cn))
 | |
| 
 | |
| 	// gcr.io/k8s-cri-containerd/volume-copy-up:2.0 contains a test_dir
 | |
| 	// volume, which contains a test_file with content "test_content".
 | |
| 	t.Logf("Check whether volume contains the test file")
 | |
| 	stdout, stderr, err := runtimeService.ExecSync(cn, []string{
 | |
| 		"cat",
 | |
| 		"/test_dir/test_file",
 | |
| 	}, execTimeout)
 | |
| 	require.NoError(t, err)
 | |
| 	assert.Empty(t, stderr)
 | |
| 	assert.Equal(t, "test_content\n", string(stdout))
 | |
| 
 | |
| 	t.Logf("Check host path of the volume")
 | |
| 	hostCmd := fmt.Sprintf("find %s/containers/%s/volumes/*/test_file | xargs cat", *criRoot, cn)
 | |
| 	output, err := exec.Command("sh", "-c", hostCmd).CombinedOutput()
 | |
| 	require.NoError(t, err)
 | |
| 	assert.Equal(t, "test_content\n", string(output))
 | |
| 
 | |
| 	t.Logf("Update volume from inside the container")
 | |
| 	_, _, err = runtimeService.ExecSync(cn, []string{
 | |
| 		"sh",
 | |
| 		"-c",
 | |
| 		"echo new_content > /test_dir/test_file",
 | |
| 	}, execTimeout)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	t.Logf("Check whether host path of the volume is updated")
 | |
| 	output, err = exec.Command("sh", "-c", hostCmd).CombinedOutput()
 | |
| 	require.NoError(t, err)
 | |
| 	assert.Equal(t, "new_content\n", string(output))
 | |
| }
 | |
| 
 | |
| func TestVolumeOwnership(t *testing.T) {
 | |
| 	var (
 | |
| 		testImage   = GetImage(VolumeOwnership)
 | |
| 		execTimeout = time.Minute
 | |
| 	)
 | |
| 
 | |
| 	t.Logf("Create a sandbox")
 | |
| 	sbConfig := PodSandboxConfig("sandbox", "volume-ownership")
 | |
| 	sb, err := runtimeService.RunPodSandbox(sbConfig, *runtimeHandler)
 | |
| 	require.NoError(t, err)
 | |
| 	defer func() {
 | |
| 		assert.NoError(t, runtimeService.StopPodSandbox(sb))
 | |
| 		assert.NoError(t, runtimeService.RemovePodSandbox(sb))
 | |
| 	}()
 | |
| 
 | |
| 	t.Logf("Pull test image")
 | |
| 	_, err = imageService.PullImage(&runtime.ImageSpec{Image: testImage}, nil, sbConfig)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	t.Logf("Create a container with volume-ownership test image")
 | |
| 	cnConfig := ContainerConfig(
 | |
| 		"container",
 | |
| 		testImage,
 | |
| 		WithCommand("tail", "-f", "/dev/null"),
 | |
| 	)
 | |
| 	cn, err := runtimeService.CreateContainer(sb, cnConfig, sbConfig)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	t.Logf("Start the container")
 | |
| 	require.NoError(t, runtimeService.StartContainer(cn))
 | |
| 
 | |
| 	// gcr.io/k8s-cri-containerd/volume-ownership:2.0 contains a test_dir
 | |
| 	// volume, which is owned by nobody:nogroup.
 | |
| 	t.Logf("Check ownership of test directory inside container")
 | |
| 	stdout, stderr, err := runtimeService.ExecSync(cn, []string{
 | |
| 		"stat", "-c", "%U:%G", "/test_dir",
 | |
| 	}, execTimeout)
 | |
| 	require.NoError(t, err)
 | |
| 	assert.Empty(t, stderr)
 | |
| 	assert.Equal(t, "nobody:nogroup\n", string(stdout))
 | |
| 
 | |
| 	t.Logf("Check ownership of test directory on the host")
 | |
| 	hostCmd := fmt.Sprintf("find %s/containers/%s/volumes/* | xargs stat -c %%U:%%G", *criRoot, cn)
 | |
| 	output, err := exec.Command("sh", "-c", hostCmd).CombinedOutput()
 | |
| 	require.NoError(t, err)
 | |
| 	assert.Equal(t, "nobody:nogroup\n", string(output))
 | |
| }
 |