github.com/sams1990/dockerrepo@v17.12.1-ce-rc2+incompatible/pkg/sysinfo/sysinfo_linux_test.go (about)

     1  package sysinfo
     2  
     3  import (
     4  	"io/ioutil"
     5  	"os"
     6  	"path"
     7  	"path/filepath"
     8  	"testing"
     9  
    10  	"github.com/stretchr/testify/require"
    11  	"golang.org/x/sys/unix"
    12  )
    13  
    14  func TestReadProcBool(t *testing.T) {
    15  	tmpDir, err := ioutil.TempDir("", "test-sysinfo-proc")
    16  	require.NoError(t, err)
    17  	defer os.RemoveAll(tmpDir)
    18  
    19  	procFile := filepath.Join(tmpDir, "read-proc-bool")
    20  	err = ioutil.WriteFile(procFile, []byte("1"), 0644)
    21  	require.NoError(t, err)
    22  
    23  	if !readProcBool(procFile) {
    24  		t.Fatal("expected proc bool to be true, got false")
    25  	}
    26  
    27  	if err := ioutil.WriteFile(procFile, []byte("0"), 0644); err != nil {
    28  		t.Fatal(err)
    29  	}
    30  	if readProcBool(procFile) {
    31  		t.Fatal("expected proc bool to be false, got true")
    32  	}
    33  
    34  	if readProcBool(path.Join(tmpDir, "no-exist")) {
    35  		t.Fatal("should be false for non-existent entry")
    36  	}
    37  
    38  }
    39  
    40  func TestCgroupEnabled(t *testing.T) {
    41  	cgroupDir, err := ioutil.TempDir("", "cgroup-test")
    42  	require.NoError(t, err)
    43  	defer os.RemoveAll(cgroupDir)
    44  
    45  	if cgroupEnabled(cgroupDir, "test") {
    46  		t.Fatal("cgroupEnabled should be false")
    47  	}
    48  
    49  	err = ioutil.WriteFile(path.Join(cgroupDir, "test"), []byte{}, 0644)
    50  	require.NoError(t, err)
    51  
    52  	if !cgroupEnabled(cgroupDir, "test") {
    53  		t.Fatal("cgroupEnabled should be true")
    54  	}
    55  }
    56  
    57  func TestNew(t *testing.T) {
    58  	sysInfo := New(false)
    59  	require.NotNil(t, sysInfo)
    60  	checkSysInfo(t, sysInfo)
    61  
    62  	sysInfo = New(true)
    63  	require.NotNil(t, sysInfo)
    64  	checkSysInfo(t, sysInfo)
    65  }
    66  
    67  func checkSysInfo(t *testing.T, sysInfo *SysInfo) {
    68  	// Check if Seccomp is supported, via CONFIG_SECCOMP.then sysInfo.Seccomp must be TRUE , else FALSE
    69  	if err := unix.Prctl(unix.PR_GET_SECCOMP, 0, 0, 0, 0); err != unix.EINVAL {
    70  		// Make sure the kernel has CONFIG_SECCOMP_FILTER.
    71  		if err := unix.Prctl(unix.PR_SET_SECCOMP, unix.SECCOMP_MODE_FILTER, 0, 0, 0); err != unix.EINVAL {
    72  			require.True(t, sysInfo.Seccomp)
    73  		}
    74  	} else {
    75  		require.False(t, sysInfo.Seccomp)
    76  	}
    77  }
    78  
    79  func TestNewAppArmorEnabled(t *testing.T) {
    80  	// Check if AppArmor is supported. then it must be TRUE , else FALSE
    81  	if _, err := os.Stat("/sys/kernel/security/apparmor"); err != nil {
    82  		t.Skip("App Armor Must be Enabled")
    83  	}
    84  
    85  	sysInfo := New(true)
    86  	require.True(t, sysInfo.AppArmor)
    87  }
    88  
    89  func TestNewAppArmorDisabled(t *testing.T) {
    90  	// Check if AppArmor is supported. then it must be TRUE , else FALSE
    91  	if _, err := os.Stat("/sys/kernel/security/apparmor"); !os.IsNotExist(err) {
    92  		t.Skip("App Armor Must be Disabled")
    93  	}
    94  
    95  	sysInfo := New(true)
    96  	require.False(t, sysInfo.AppArmor)
    97  }
    98  
    99  func TestNumCPU(t *testing.T) {
   100  	cpuNumbers := NumCPU()
   101  	if cpuNumbers <= 0 {
   102  		t.Fatal("CPU returned must be greater than zero")
   103  	}
   104  }