Files
podman/libpod/common_test.go
Matthew Heon 118e78c5d6 Add structure for new exec session tracking to DB
As part of the rework of exec sessions, we need to address them
independently of containers. In the new API, we need to be able
to fetch them by their ID, regardless of what container they are
associated with. Unfortunately, our existing exec sessions are
tied to individual containers; there's no way to tell what
container a session belongs to and retrieve it without getting
every exec session for every container.

This adds a pointer to the container an exec session is
associated with to the database. The sessions themselves are
still stored in the container.

Exec-related APIs have been restructured to work with the new
database representation. The originally monolithic API has been
split into a number of smaller calls to allow more fine-grained
control of lifecycle. Support for legacy exec sessions has been
retained, but in a deprecated fashion; we should remove this in
a few releases.

Signed-off-by: Matthew Heon <matthew.heon@pm.me>
2020-03-18 11:02:14 -04:00

236 lines
5.7 KiB
Go

package libpod
import (
"net"
"reflect"
"strings"
"testing"
"time"
"github.com/containers/libpod/libpod/config"
"github.com/containers/libpod/libpod/define"
"github.com/containers/libpod/libpod/lock"
"github.com/cri-o/ocicni/pkg/ocicni"
"github.com/opencontainers/runtime-tools/generate"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
)
func getTestContainer(id, name string, manager lock.Manager) (*Container, error) {
ctr := &Container{
config: &ContainerConfig{
ID: id,
Name: name,
RootfsImageID: id,
RootfsImageName: "testimg",
StaticDir: "/does/not/exist/",
LogPath: "/does/not/exist/",
Stdin: true,
Labels: map[string]string{"a": "b", "c": "d"},
StopSignal: 0,
StopTimeout: 0,
CreatedTime: time.Now(),
Privileged: true,
Mounts: []string{"/does/not/exist"},
DNSServer: []net.IP{net.ParseIP("192.168.1.1"), net.ParseIP("192.168.2.2")},
DNSSearch: []string{"example.com", "example.example.com"},
PortMappings: []ocicni.PortMapping{
{
HostPort: 80,
ContainerPort: 90,
Protocol: "tcp",
HostIP: "192.168.3.3",
},
{
HostPort: 100,
ContainerPort: 110,
Protocol: "udp",
HostIP: "192.168.4.4",
},
},
},
state: &ContainerState{
State: define.ContainerStateRunning,
ConfigPath: "/does/not/exist/specs/" + id,
RunDir: "/does/not/exist/tmp/",
Mounted: true,
Mountpoint: "/does/not/exist/tmp/" + id,
PID: 1234,
ExecSessions: map[string]*ExecSession{
"abcd": {
Id: "1",
PID: 9876,
},
"ef01": {
Id: "5",
PID: 46765,
},
},
BindMounts: map[string]string{
"/1/2/3": "/4/5/6",
"/test/file.test": "/test2/file2.test",
},
},
runtime: &Runtime{
config: &config.Config{
VolumePath: "/does/not/exist/tmp/volumes",
},
},
valid: true,
}
g, err := generate.New("linux")
if err != nil {
return nil, err
}
ctr.config.Spec = g.Config
ctr.config.Labels["test"] = "testing"
// Allocate a containerLock for the container
containerLock, err := manager.AllocateLock()
if err != nil {
return nil, err
}
ctr.lock = containerLock
ctr.config.LockID = containerLock.ID()
return ctr, nil
}
func getTestPod(id, name string, manager lock.Manager) (*Pod, error) {
pod := &Pod{
config: &PodConfig{
ID: id,
Name: name,
Labels: map[string]string{"a": "b", "c": "d"},
CgroupParent: "/hello/world/cgroup/parent",
},
state: &podState{
CgroupPath: "/path/to/cgroups/hello/",
},
valid: true,
}
// Allocate a podLock for the pod
podLock, err := manager.AllocateLock()
if err != nil {
return nil, err
}
pod.lock = podLock
pod.config.LockID = podLock.ID()
return pod, nil
}
func getTestCtrN(n string, manager lock.Manager) (*Container, error) {
return getTestContainer(strings.Repeat(n, 32), "test"+n, manager)
}
func getTestCtr1(manager lock.Manager) (*Container, error) {
return getTestCtrN("1", manager)
}
func getTestCtr2(manager lock.Manager) (*Container, error) {
return getTestCtrN("2", manager)
}
func getTestPodN(n string, manager lock.Manager) (*Pod, error) {
return getTestPod(strings.Repeat(n, 32), "test"+n, manager)
}
func getTestPod1(manager lock.Manager) (*Pod, error) {
return getTestPodN("1", manager)
}
func getTestPod2(manager lock.Manager) (*Pod, error) {
return getTestPodN("2", manager)
}
// This horrible hack tests if containers are equal in a way that should handle
// empty arrays being dropped to nil pointers in the spec JSON
// For some operations (container retrieval from the database) state is allowed
// to be empty. This is controlled by the allowedEmpty bool.
func testContainersEqual(t *testing.T, a, b *Container, allowedEmpty bool) {
if a == nil && b == nil {
return
}
require.NotNil(t, a)
require.NotNil(t, b)
require.NotNil(t, a.config)
require.NotNil(t, b.config)
require.NotNil(t, a.state)
require.NotNil(t, b.state)
aConfig := new(ContainerConfig)
bConfig := new(ContainerConfig)
aState := new(ContainerState)
bState := new(ContainerState)
blankState := new(ContainerState)
assert.Equal(t, a.valid, b.valid)
assert.Equal(t, a.lock.ID(), b.lock.ID())
aConfigJSON, err := json.Marshal(a.config)
assert.NoError(t, err)
err = json.Unmarshal(aConfigJSON, aConfig)
assert.NoError(t, err)
bConfigJSON, err := json.Marshal(b.config)
assert.NoError(t, err)
err = json.Unmarshal(bConfigJSON, bConfig)
assert.NoError(t, err)
assert.EqualValues(t, aConfig, bConfig)
aStateJSON, err := json.Marshal(a.state)
assert.NoError(t, err)
err = json.Unmarshal(aStateJSON, aState)
assert.NoError(t, err)
bStateJSON, err := json.Marshal(b.state)
assert.NoError(t, err)
err = json.Unmarshal(bStateJSON, bState)
assert.NoError(t, err)
if allowedEmpty {
assert.True(t, reflect.DeepEqual(aState, bState) || reflect.DeepEqual(aState, blankState))
} else {
assert.EqualValues(t, aState, bState)
}
}
// Test if pods are equal.
// For some operations (pod retrieval from the database) state is allowed to be
// empty. This is controlled by the allowedEmpty bool.
func testPodsEqual(t *testing.T, a, b *Pod, allowedEmpty bool) {
if a == nil && b == nil {
return
}
blankState := new(podState)
require.NotNil(t, a)
require.NotNil(t, b)
require.NotNil(t, a.config)
require.NotNil(t, b.config)
require.NotNil(t, a.state)
require.NotNil(t, b.state)
assert.Equal(t, a.valid, b.valid)
assert.Equal(t, a.lock.ID(), b.lock.ID())
assert.EqualValues(t, a.config, b.config)
if allowedEmpty {
assert.True(t, reflect.DeepEqual(a.state, b.state) || reflect.DeepEqual(a.state, blankState))
} else {
assert.EqualValues(t, a.state, b.state)
}
}