 d7864eb77b
			
		
	
	d7864eb77b
	
	
	
		
			
			By default, the generated spec will place containers in cgroups by their ids, we need to use the namespace as the cgroup root to avoid containers with the same name being placed in the same cgroup. ``` 11:perf_event:/to/redis 10:freezer:/to/redis 9:memory:/to/redis 8:devices:/to/redis 7:net_cls,net_prio:/to/redis 6:pids:/to/redis 5:hugetlb:/to/redis 4:cpuset:/to/redis 3:blkio:/to/redis 2:cpu,cpuacct:/to/redis 1:name=systemd:/to/redis 11:perf_event:/te/redis 10:freezer:/te/redis 9:memory:/te/redis 8:devices:/te/redis 7:net_cls,net_prio:/te/redis 6:pids:/te/redis 5:hugetlb:/te/redis 4:cpuset:/te/redis 3:blkio:/te/redis 2:cpu,cpuacct:/te/redis 1:name=systemd:/te/redis ``` Signed-off-by: Michael Crosby <crosbymichael@gmail.com>
		
			
				
	
	
		
			95 lines
		
	
	
		
			2.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			95 lines
		
	
	
		
			2.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // +build !windows
 | |
| 
 | |
| package containerd
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"testing"
 | |
| 
 | |
| 	"github.com/containerd/containerd/containers"
 | |
| 	"github.com/containerd/containerd/namespaces"
 | |
| 	specs "github.com/opencontainers/runtime-spec/specs-go"
 | |
| )
 | |
| 
 | |
| func TestGenerateSpec(t *testing.T) {
 | |
| 	t.Parallel()
 | |
| 
 | |
| 	ctx := namespaces.WithNamespace(context.Background(), "testing")
 | |
| 	s, err := GenerateSpec(ctx, nil, &containers.Container{ID: t.Name()})
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	if s == nil {
 | |
| 		t.Fatal("GenerateSpec() returns a nil spec")
 | |
| 	}
 | |
| 
 | |
| 	// check for matching caps
 | |
| 	defaults := defaultCaps()
 | |
| 	for _, cl := range [][]string{
 | |
| 		s.Process.Capabilities.Bounding,
 | |
| 		s.Process.Capabilities.Permitted,
 | |
| 		s.Process.Capabilities.Inheritable,
 | |
| 		s.Process.Capabilities.Effective,
 | |
| 	} {
 | |
| 		for i := 0; i < len(defaults); i++ {
 | |
| 			if cl[i] != defaults[i] {
 | |
| 				t.Errorf("cap at %d does not match set %q != %q", i, defaults[i], cl[i])
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// check default namespaces
 | |
| 	defaultNS := defaultNamespaces()
 | |
| 	for i, ns := range s.Linux.Namespaces {
 | |
| 		if defaultNS[i] != ns {
 | |
| 			t.Errorf("ns at %d does not match set %q != %q", i, defaultNS[i], ns)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// test that we don't have tty set
 | |
| 	if s.Process.Terminal {
 | |
| 		t.Error("terminal set on default process")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestSpecWithTTY(t *testing.T) {
 | |
| 	t.Parallel()
 | |
| 
 | |
| 	ctx := namespaces.WithNamespace(context.Background(), "testing")
 | |
| 	s, err := GenerateSpec(ctx, nil, &containers.Container{ID: t.Name()}, WithTTY)
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	if !s.Process.Terminal {
 | |
| 		t.Error("terminal net set WithTTY()")
 | |
| 	}
 | |
| 	v := s.Process.Env[len(s.Process.Env)-1]
 | |
| 	if v != "TERM=xterm" {
 | |
| 		t.Errorf("xterm not set in env for TTY")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestWithLinuxNamespace(t *testing.T) {
 | |
| 	t.Parallel()
 | |
| 
 | |
| 	ctx := namespaces.WithNamespace(context.Background(), "testing")
 | |
| 	replacedNS := specs.LinuxNamespace{Type: specs.NetworkNamespace, Path: "/var/run/netns/test"}
 | |
| 
 | |
| 	s, err := GenerateSpec(ctx, nil, &containers.Container{ID: t.Name()}, WithLinuxNamespace(replacedNS))
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	defaultNS := defaultNamespaces()
 | |
| 	found := false
 | |
| 	for i, ns := range s.Linux.Namespaces {
 | |
| 		if ns == replacedNS && !found {
 | |
| 			found = true
 | |
| 			continue
 | |
| 		}
 | |
| 		if defaultNS[i] != ns {
 | |
| 			t.Errorf("ns at %d does not match set %q != %q", i, defaultNS[i], ns)
 | |
| 		}
 | |
| 	}
 | |
| }
 |