automation-tests/common/pkg/config/config_test.go

469 lines
11 KiB
Go

package config
import (
"io/ioutil"
"os"
"path"
"sort"
"strings"
"github.com/containers/common/pkg/capabilities"
. "github.com/onsi/ginkgo"
. "github.com/onsi/gomega"
selinux "github.com/opencontainers/selinux/go-selinux"
)
var _ = Describe("Config", func() {
BeforeEach(beforeEach)
Describe("ValidateConfig", func() {
It("should succeed with default config", func() {
// Given
// When
defaultConfig, err := NewConfig("")
// Then
Expect(err).To(BeNil())
Expect(defaultConfig.Containers.ApparmorProfile).To(Equal("container-default"))
Expect(defaultConfig.Containers.PidsLimit).To(BeEquivalentTo(2048))
})
It("should succeed with devices", func() {
// Given
sut.Containers.Devices = []string{"/dev/null:/dev/null:rw",
"/dev/sdc/",
"/dev/sdc:/dev/xvdc",
"/dev/sdc:rm",
}
// When
err := sut.Containers.Validate()
// Then
Expect(err).To(BeNil())
})
It("should fail on wrong DefaultUlimits", func() {
// Given
sut.Containers.DefaultUlimits = []string{invalidPath}
// When
err := sut.Containers.Validate()
// Then
Expect(err).NotTo(BeNil())
})
It("should fail on wrong invalid device specification", func() {
// Given
sut.Containers.Devices = []string{"::::"}
// When
err := sut.Containers.Validate()
// Then
Expect(err).NotTo(BeNil())
})
It("should fail on invalid device", func() {
// Given
sut.Containers.Devices = []string{invalidPath}
// When
err := sut.Containers.Validate()
// Then
Expect(err).NotTo(BeNil())
})
It("should fail on invalid device mode", func() {
// Given
sut.Containers.Devices = []string{"/dev/null:/dev/null:abc"}
// When
err := sut.Containers.Validate()
// Then
Expect(err).NotTo(BeNil())
})
It("should fail on invalid first device", func() {
// Given
sut.Containers.Devices = []string{"wrong:/dev/null:rw"}
// When
err := sut.Containers.Validate()
// Then
Expect(err).NotTo(BeNil())
})
It("should fail on invalid second device", func() {
// Given
sut.Containers.Devices = []string{"/dev/null:wrong:rw"}
// When
err := sut.Containers.Validate()
// Then
Expect(err).NotTo(BeNil())
})
It("should fail wrong max log size", func() {
// Given
sut.Containers.LogSizeMax = 1
// When
err := sut.Validate()
// Then
Expect(err).NotTo(BeNil())
})
It("should succeed with valid shm size", func() {
// Given
sut.Containers.ShmSize = "1024"
// When
err := sut.Validate()
// Then
Expect(err).To(BeNil())
// Given
sut.Containers.ShmSize = "64m"
// When
err = sut.Validate()
// Then
Expect(err).To(BeNil())
})
It("should fail wrong shm size", func() {
// Given
sut.Containers.ShmSize = "-2"
// When
err := sut.Validate()
// Then
Expect(err).NotTo(BeNil())
})
It("Check SELinux settings", func() {
if selinux.GetEnabled() {
sut.Containers.EnableLabeling = true
Expect(sut.Containers.Validate()).To(BeNil())
Expect(selinux.GetEnabled()).To(BeTrue())
sut.Containers.EnableLabeling = false
Expect(sut.Containers.Validate()).To(BeNil())
Expect(selinux.GetEnabled()).To(BeFalse())
}
})
})
Describe("ValidateNetworkConfig", func() {
It("should succeed with default config", func() {
// Given
// When
err := sut.Network.Validate()
// Then
Expect(err).To(BeNil())
})
It("should fail during runtime", func() {
validDirPath, err := ioutil.TempDir("", "config-empty")
if err != nil {
panic(err)
}
defer os.RemoveAll(validDirPath)
// Given
sut.Network.NetworkConfigDir = validDirPath
tmpDir := path.Join(os.TempDir(), "cni-test")
sut.Network.CNIPluginDirs = []string{tmpDir}
defer os.RemoveAll(tmpDir)
// When
err = sut.Network.Validate()
// Then
Expect(err).ToNot(BeNil())
})
It("should fail on invalid NetworkConfigDir", func() {
// Given
tmpfile := path.Join(os.TempDir(), "wrong-file")
file, err := os.Create(tmpfile)
Expect(err).To(BeNil())
file.Close()
defer os.Remove(tmpfile)
sut.Network.NetworkConfigDir = tmpfile
sut.Network.CNIPluginDirs = []string{}
// When
err = sut.Network.Validate()
// Then
Expect(err).NotTo(BeNil())
})
It("should fail on invalid CNIPluginDirs", func() {
validDirPath, err := ioutil.TempDir("", "config-empty")
if err != nil {
panic(err)
}
defer os.RemoveAll(validDirPath)
// Given
sut.Network.NetworkConfigDir = validDirPath
sut.Network.CNIPluginDirs = []string{invalidPath}
// When
err = sut.Network.Validate()
// Then
Expect(err).NotTo(BeNil())
})
It("should fail in validating invalid PluginDir", func() {
validDirPath, err := ioutil.TempDir("", "config-empty")
if err != nil {
panic(err)
}
defer os.RemoveAll(validDirPath)
// Given
sut.Network.NetworkConfigDir = validDirPath
sut.Network.CNIPluginDirs = []string{invalidPath}
// When
err = sut.Network.Validate()
// Then
Expect(err).ToNot(BeNil())
})
})
Describe("readConfigFromFile", func() {
It("should succeed with default config", func() {
// Given
// When
conf, _ := DefaultConfig()
defaultConfig, err := readConfigFromFile("testdata/containers_default.conf", conf)
OCIRuntimeMap := map[string][]string{
"runc": {
"/usr/bin/runc",
"/usr/sbin/runc",
"/usr/local/bin/runc",
"/usr/local/sbin/runc",
"/sbin/runc",
"/bin/runc",
"/usr/lib/cri-o-runc/sbin/runc",
},
"crun": {
"/usr/bin/crun",
"/usr/local/bin/crun",
},
}
pluginDirs := []string{
"/usr/libexec/cni",
"/usr/lib/cni",
"/usr/local/lib/cni",
"/opt/cni/bin",
}
envs := []string{
"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
}
// Then
Expect(err).To(BeNil())
Expect(defaultConfig.Libpod.CgroupManager).To(Equal("systemd"))
Expect(defaultConfig.Containers.Env).To(BeEquivalentTo(envs))
Expect(defaultConfig.Containers.PidsLimit).To(BeEquivalentTo(2048))
Expect(defaultConfig.Network.CNIPluginDirs).To(Equal(pluginDirs))
Expect(defaultConfig.Libpod.NumLocks).To(BeEquivalentTo(2048))
Expect(defaultConfig.Libpod.OCIRuntimes).To(Equal(OCIRuntimeMap))
})
It("should succeed with commented out configuration", func() {
// Given
// When
conf := Config{}
_, err := readConfigFromFile("testdata/containers_comment.conf", &conf)
// Then
Expect(err).To(BeNil())
})
It("should fail when file does not exist", func() {
// Given
// When
conf := Config{}
_, err := readConfigFromFile("/invalid/file", &conf)
// Then
Expect(err).NotTo(BeNil())
})
It("should fail when toml decode fails", func() {
// Given
// When
conf := Config{}
_, err := readConfigFromFile("config.go", &conf)
// Then
Expect(err).NotTo(BeNil())
})
})
Describe("NewConfig", func() {
It("should success with default config", func() {
// Given
OCIRuntimeMap := map[string][]string{
"runc": {
"/usr/bin/runc",
"/usr/sbin/runc",
"/usr/local/bin/runc",
"/usr/local/sbin/runc",
"/sbin/runc",
"/bin/runc",
"/usr/lib/cri-o-runc/sbin/runc",
"/run/current-system/sw/bin/runc",
},
"crun": {
"/usr/bin/crun",
"/usr/sbin/crun",
"/usr/local/bin/crun",
"/usr/local/sbin/crun",
"/sbin/crun",
"/bin/crun",
"/run/current-system/sw/bin/crun",
},
}
pluginDirs := []string{
"/usr/libexec/cni",
"/usr/lib/cni",
"/usr/local/lib/cni",
"/opt/cni/bin",
}
envs := []string{
"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
}
// When
config, err := NewConfig("")
// Then
Expect(err).To(BeNil())
Expect(config.Containers.ApparmorProfile).To(Equal("container-default"))
Expect(config.Containers.PidsLimit).To(BeEquivalentTo(2048))
Expect(config.Containers.Env).To(BeEquivalentTo(envs))
Expect(config.Network.CNIPluginDirs).To(Equal(pluginDirs))
Expect(config.Libpod.NumLocks).To(BeEquivalentTo(2048))
Expect(config.Libpod.OCIRuntimes["runc"]).To(Equal(OCIRuntimeMap["runc"]))
})
It("verify getDefaultEnv", func() {
envs := []string{
"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
}
// When
config, err := Default()
// Then
Expect(err).To(BeNil())
Expect(config.GetDefaultEnv()).To(BeEquivalentTo(envs))
config.Containers.HTTPProxy = true
Expect(config.GetDefaultEnv()).To(BeEquivalentTo(envs))
os.Setenv("HTTP_PROXY", "localhost")
os.Setenv("FOO", "BAR")
newenvs := []string{"HTTP_PROXY=localhost"}
envs = append(newenvs, envs...)
Expect(config.GetDefaultEnv()).To(BeEquivalentTo(envs))
config.Containers.HTTPProxy = false
config.Containers.EnvHost = true
envString := strings.Join(config.GetDefaultEnv(), ",")
Expect(envString).To(ContainSubstring("FOO=BAR"))
Expect(envString).To(ContainSubstring("HTTP_PROXY=localhost"))
})
It("should success with valid user file path", func() {
// Given
// When
config, err := NewConfig("testdata/containers_default.conf")
// Then
Expect(err).To(BeNil())
Expect(config.Containers.ApparmorProfile).To(Equal("container-default"))
Expect(config.Containers.PidsLimit).To(BeEquivalentTo(2048))
})
It("should fail with invalid value", func() {
// Given
// When
config, err := NewConfig("testdata/containers_invalid.conf")
// Then
Expect(err).ToNot(BeNil())
Expect(config).To(BeNil())
})
It("Test Capabilities call", func() {
// Given
// When
config, err := NewConfig("")
// Then
Expect(err).To(BeNil())
var addcaps, dropcaps []string
caps := config.Capabilities("0", addcaps, dropcaps)
sort.Strings(caps)
defaultCaps := config.Containers.DefaultCapabilities
sort.Strings(defaultCaps)
Expect(caps).To(BeEquivalentTo(defaultCaps))
// Add all caps
addcaps = []string{"all"}
caps = config.Capabilities("root", addcaps, dropcaps)
sort.Strings(caps)
Expect(caps).ToNot(BeEquivalentTo(capabilities.AllCapabilities()))
// Drop all caps
dropcaps = []string{"all"}
caps = config.Capabilities("", addcaps, dropcaps)
sort.Strings(caps)
Expect(caps).ToNot(BeEquivalentTo([]string{}))
config.Containers.DefaultCapabilities = []string{
"CAP_AUDIT_WRITE",
"CAP_CHOWN",
"CAP_DAC_OVERRIDE",
"CAP_FOWNER",
}
expectedCaps := []string{
"CAP_AUDIT_WRITE",
"CAP_DAC_OVERRIDE",
"CAP_NET_ADMIN",
"CAP_SYS_ADMIN",
}
// Add all caps
addcaps = []string{"CAP_NET_ADMIN", "CAP_SYS_ADMIN"}
dropcaps = []string{"CAP_FOWNER", "CAP_CHOWN"}
caps = config.Capabilities("", addcaps, dropcaps)
sort.Strings(caps)
Expect(caps).To(BeEquivalentTo(expectedCaps))
caps = config.Capabilities("notroot", addcaps, dropcaps)
sort.Strings(caps)
Expect(caps).To(BeEquivalentTo(addcaps))
})
})
})