mirror of
https://github.com/containers/podman.git
synced 2025-05-22 01:27:07 +08:00

We do not use the ocicni code anymore so let's get rid of it. Only the port struct is used but we can copy this into libpod network types so we can debloat the binary. The next step is to remove the OCICNI port mapping form the container config and use the better PortMapping struct everywhere. Signed-off-by: Paul Holzinger <pholzing@redhat.com>
246 lines
6.0 KiB
Go
246 lines
6.0 KiB
Go
package libpod
|
|
|
|
import (
|
|
"net"
|
|
"reflect"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/containers/common/pkg/config"
|
|
"github.com/containers/podman/v3/libpod/define"
|
|
"github.com/containers/podman/v3/libpod/lock"
|
|
"github.com/containers/podman/v3/libpod/network/types"
|
|
"github.com/opencontainers/runtime-tools/generate"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func getTestContainer(id, name string, manager lock.Manager) (*Container, error) {
|
|
ctr := &Container{
|
|
config: &ContainerConfig{
|
|
ID: id,
|
|
Name: name,
|
|
ContainerRootFSConfig: ContainerRootFSConfig{
|
|
RootfsImageID: id,
|
|
RootfsImageName: "testimg",
|
|
StaticDir: "/does/not/exist/",
|
|
Mounts: []string{"/does/not/exist"},
|
|
},
|
|
ContainerMiscConfig: ContainerMiscConfig{
|
|
LogPath: "/does/not/exist/",
|
|
Stdin: true,
|
|
Labels: map[string]string{"a": "b", "c": "d"},
|
|
StopSignal: 0,
|
|
StopTimeout: 0,
|
|
CreatedTime: time.Now(),
|
|
},
|
|
ContainerSecurityConfig: ContainerSecurityConfig{
|
|
Privileged: true,
|
|
},
|
|
ContainerNetworkConfig: ContainerNetworkConfig{
|
|
DNSServer: []net.IP{net.ParseIP("192.168.1.1"), net.ParseIP("192.168.2.2")},
|
|
DNSSearch: []string{"example.com", "example.example.com"},
|
|
PortMappings: []types.OCICNIPortMapping{
|
|
{
|
|
HostPort: 80,
|
|
ContainerPort: 90,
|
|
Protocol: "tcp",
|
|
HostIP: "192.168.3.3",
|
|
},
|
|
{
|
|
HostPort: 100,
|
|
ContainerPort: 110,
|
|
Protocol: "udp",
|
|
HostIP: "192.168.4.4",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
state: &ContainerState{
|
|
State: define.ContainerStateRunning,
|
|
ConfigPath: "/does/not/exist/specs/" + id,
|
|
RunDir: "/does/not/exist/tmp/",
|
|
Mounted: true,
|
|
Mountpoint: "/does/not/exist/tmp/" + id,
|
|
PID: 1234,
|
|
ExecSessions: map[string]*ExecSession{
|
|
"abcd": {
|
|
Id: "1",
|
|
PID: 9876,
|
|
},
|
|
"ef01": {
|
|
Id: "5",
|
|
PID: 46765,
|
|
},
|
|
},
|
|
BindMounts: map[string]string{
|
|
"/1/2/3": "/4/5/6",
|
|
"/test/file.test": "/test2/file2.test",
|
|
},
|
|
},
|
|
runtime: &Runtime{
|
|
config: &config.Config{
|
|
Engine: config.EngineConfig{
|
|
VolumePath: "/does/not/exist/tmp/volumes",
|
|
},
|
|
},
|
|
},
|
|
valid: true,
|
|
}
|
|
|
|
g, err := generate.New("linux")
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
ctr.config.Spec = g.Config
|
|
|
|
ctr.config.Labels["test"] = "testing"
|
|
|
|
// Allocate a containerLock for the container
|
|
containerLock, err := manager.AllocateLock()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
ctr.lock = containerLock
|
|
ctr.config.LockID = containerLock.ID()
|
|
|
|
return ctr, nil
|
|
}
|
|
|
|
func getTestPod(id, name string, manager lock.Manager) (*Pod, error) {
|
|
pod := &Pod{
|
|
config: &PodConfig{
|
|
ID: id,
|
|
Name: name,
|
|
Labels: map[string]string{"a": "b", "c": "d"},
|
|
CgroupParent: "/hello/world/cgroup/parent",
|
|
},
|
|
state: &podState{
|
|
CgroupPath: "/path/to/cgroups/hello/",
|
|
},
|
|
valid: true,
|
|
}
|
|
|
|
// Allocate a podLock for the pod
|
|
podLock, err := manager.AllocateLock()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
pod.lock = podLock
|
|
pod.config.LockID = podLock.ID()
|
|
|
|
return pod, nil
|
|
}
|
|
|
|
func getTestCtrN(n string, manager lock.Manager) (*Container, error) {
|
|
return getTestContainer(strings.Repeat(n, 32), "test"+n, manager)
|
|
}
|
|
|
|
func getTestCtr1(manager lock.Manager) (*Container, error) {
|
|
return getTestCtrN("1", manager)
|
|
}
|
|
|
|
func getTestCtr2(manager lock.Manager) (*Container, error) {
|
|
return getTestCtrN("2", manager)
|
|
}
|
|
|
|
func getTestPodN(n string, manager lock.Manager) (*Pod, error) {
|
|
return getTestPod(strings.Repeat(n, 32), "test"+n, manager)
|
|
}
|
|
|
|
func getTestPod1(manager lock.Manager) (*Pod, error) {
|
|
return getTestPodN("1", manager)
|
|
}
|
|
|
|
func getTestPod2(manager lock.Manager) (*Pod, error) {
|
|
return getTestPodN("2", manager)
|
|
}
|
|
|
|
// This horrible hack tests if containers are equal in a way that should handle
|
|
// empty arrays being dropped to nil pointers in the spec JSON
|
|
// For some operations (container retrieval from the database) state is allowed
|
|
// to be empty. This is controlled by the allowedEmpty bool.
|
|
func testContainersEqual(t *testing.T, a, b *Container, allowedEmpty bool) {
|
|
if a == nil && b == nil {
|
|
return
|
|
}
|
|
require.NotNil(t, a)
|
|
require.NotNil(t, b)
|
|
|
|
require.NotNil(t, a.config)
|
|
require.NotNil(t, b.config)
|
|
require.NotNil(t, a.state)
|
|
require.NotNil(t, b.state)
|
|
|
|
aConfig := new(ContainerConfig)
|
|
bConfig := new(ContainerConfig)
|
|
aState := new(ContainerState)
|
|
bState := new(ContainerState)
|
|
|
|
blankState := new(ContainerState)
|
|
|
|
assert.Equal(t, a.valid, b.valid)
|
|
|
|
assert.Equal(t, a.lock.ID(), b.lock.ID())
|
|
|
|
aConfigJSON, err := json.Marshal(a.config)
|
|
assert.NoError(t, err)
|
|
err = json.Unmarshal(aConfigJSON, aConfig)
|
|
assert.NoError(t, err)
|
|
|
|
bConfigJSON, err := json.Marshal(b.config)
|
|
assert.NoError(t, err)
|
|
err = json.Unmarshal(bConfigJSON, bConfig)
|
|
assert.NoError(t, err)
|
|
|
|
assert.EqualValues(t, aConfig, bConfig)
|
|
|
|
aStateJSON, err := json.Marshal(a.state)
|
|
assert.NoError(t, err)
|
|
err = json.Unmarshal(aStateJSON, aState)
|
|
assert.NoError(t, err)
|
|
|
|
bStateJSON, err := json.Marshal(b.state)
|
|
assert.NoError(t, err)
|
|
err = json.Unmarshal(bStateJSON, bState)
|
|
assert.NoError(t, err)
|
|
|
|
if allowedEmpty {
|
|
assert.True(t, reflect.DeepEqual(aState, bState) || reflect.DeepEqual(aState, blankState))
|
|
} else {
|
|
assert.EqualValues(t, aState, bState)
|
|
}
|
|
}
|
|
|
|
// Test if pods are equal.
|
|
// For some operations (pod retrieval from the database) state is allowed to be
|
|
// empty. This is controlled by the allowedEmpty bool.
|
|
func testPodsEqual(t *testing.T, a, b *Pod, allowedEmpty bool) {
|
|
if a == nil && b == nil {
|
|
return
|
|
}
|
|
|
|
blankState := new(podState)
|
|
|
|
require.NotNil(t, a)
|
|
require.NotNil(t, b)
|
|
|
|
require.NotNil(t, a.config)
|
|
require.NotNil(t, b.config)
|
|
require.NotNil(t, a.state)
|
|
require.NotNil(t, b.state)
|
|
|
|
assert.Equal(t, a.valid, b.valid)
|
|
|
|
assert.Equal(t, a.lock.ID(), b.lock.ID())
|
|
|
|
assert.EqualValues(t, a.config, b.config)
|
|
|
|
if allowedEmpty {
|
|
assert.True(t, reflect.DeepEqual(a.state, b.state) || reflect.DeepEqual(a.state, blankState))
|
|
} else {
|
|
assert.EqualValues(t, a.state, b.state)
|
|
}
|
|
}
|