mirror of
https://github.com/containers/podman.git
synced 2025-12-05 04:40:47 +08:00
Final followup to #22270. That PR added a temporary convention allowing a new form of ExitWithError(), one with an exit code and stderr substring. In order to allow bite-size progress, the old no-args form was still allowed. This PR removes support for no-args ExitWithError(). This PR also adds one piece of new functionality: passing "" (empty string) as the stderr arg means "expect exit code but fail if there's anything at all in stderr". Signed-off-by: Ed Santiago <santiago@redhat.com>
56 lines
2.2 KiB
Go
56 lines
2.2 KiB
Go
package integration
|
|
|
|
import (
|
|
. "github.com/containers/podman/v5/test/utils"
|
|
. "github.com/onsi/ginkgo/v2"
|
|
. "github.com/onsi/gomega"
|
|
)
|
|
|
|
var _ = Describe("Podman run", func() {
|
|
|
|
It("podman run --seccomp-policy default", func() {
|
|
session := podmanTest.Podman([]string{"run", "-q", "--seccomp-policy", "default", alpineSeccomp, "ls"})
|
|
session.WaitWithDefaultTimeout()
|
|
Expect(session).Should(ExitCleanly())
|
|
})
|
|
|
|
It("podman run --seccomp-policy ''", func() {
|
|
// Empty string is interpreted as "default".
|
|
session := podmanTest.Podman([]string{"run", "-q", "--seccomp-policy", "", alpineSeccomp, "ls"})
|
|
session.WaitWithDefaultTimeout()
|
|
Expect(session).Should(ExitCleanly())
|
|
})
|
|
|
|
It("podman run --seccomp-policy invalid", func() {
|
|
session := podmanTest.Podman([]string{"run", "--seccomp-policy", "invalid", alpineSeccomp, "ls"})
|
|
session.WaitWithDefaultTimeout()
|
|
Expect(session).To(ExitWithError(125, `invalid seccomp policy "invalid": valid policies are ["default" "image"]`))
|
|
})
|
|
|
|
It("podman run --seccomp-policy image (block all syscalls)", func() {
|
|
session := podmanTest.Podman([]string{"run", "--seccomp-policy", "image", alpineSeccomp, "ls"})
|
|
session.WaitWithDefaultTimeout()
|
|
// TODO: we're getting a "cannot start a container that has
|
|
// stopped" error which seems surprising. Investigate
|
|
// why that is so.
|
|
if podmanTest.OCIRuntime == "runc" {
|
|
// TODO: worse than that. With runc, we get two alternating failures:
|
|
// 126 + cannot start a container that has stopped
|
|
// 127 + failed to connect to container's attach socket ... ENOENT
|
|
Expect(session.ExitCode()).To(BeNumerically(">=", 126), "Exit status using runc")
|
|
} else {
|
|
expect := "OCI runtime error: crun: read from the init process"
|
|
if IsRemote() {
|
|
expect = "for attach: crun: read from the init process: OCI runtime error"
|
|
}
|
|
Expect(session).To(ExitWithError(126, expect))
|
|
}
|
|
})
|
|
|
|
It("podman run --seccomp-policy image (bogus profile)", func() {
|
|
session := podmanTest.Podman([]string{"run", "--seccomp-policy", "image", alpineBogusSeccomp, "ls"})
|
|
session.WaitWithDefaultTimeout()
|
|
Expect(session).Should(ExitWithError(125, "loading seccomp profile failed: decoding seccomp profile failed: invalid character 'B' looking for beginning of value"))
|
|
})
|
|
})
|