github.com/sams1990/dockerrepo@v17.12.1-ce-rc2+incompatible/pkg/sysinfo/sysinfo_linux_test.go (about) 1 package sysinfo 2 3 import ( 4 "io/ioutil" 5 "os" 6 "path" 7 "path/filepath" 8 "testing" 9 10 "github.com/stretchr/testify/require" 11 "golang.org/x/sys/unix" 12 ) 13 14 func TestReadProcBool(t *testing.T) { 15 tmpDir, err := ioutil.TempDir("", "test-sysinfo-proc") 16 require.NoError(t, err) 17 defer os.RemoveAll(tmpDir) 18 19 procFile := filepath.Join(tmpDir, "read-proc-bool") 20 err = ioutil.WriteFile(procFile, []byte("1"), 0644) 21 require.NoError(t, err) 22 23 if !readProcBool(procFile) { 24 t.Fatal("expected proc bool to be true, got false") 25 } 26 27 if err := ioutil.WriteFile(procFile, []byte("0"), 0644); err != nil { 28 t.Fatal(err) 29 } 30 if readProcBool(procFile) { 31 t.Fatal("expected proc bool to be false, got true") 32 } 33 34 if readProcBool(path.Join(tmpDir, "no-exist")) { 35 t.Fatal("should be false for non-existent entry") 36 } 37 38 } 39 40 func TestCgroupEnabled(t *testing.T) { 41 cgroupDir, err := ioutil.TempDir("", "cgroup-test") 42 require.NoError(t, err) 43 defer os.RemoveAll(cgroupDir) 44 45 if cgroupEnabled(cgroupDir, "test") { 46 t.Fatal("cgroupEnabled should be false") 47 } 48 49 err = ioutil.WriteFile(path.Join(cgroupDir, "test"), []byte{}, 0644) 50 require.NoError(t, err) 51 52 if !cgroupEnabled(cgroupDir, "test") { 53 t.Fatal("cgroupEnabled should be true") 54 } 55 } 56 57 func TestNew(t *testing.T) { 58 sysInfo := New(false) 59 require.NotNil(t, sysInfo) 60 checkSysInfo(t, sysInfo) 61 62 sysInfo = New(true) 63 require.NotNil(t, sysInfo) 64 checkSysInfo(t, sysInfo) 65 } 66 67 func checkSysInfo(t *testing.T, sysInfo *SysInfo) { 68 // Check if Seccomp is supported, via CONFIG_SECCOMP.then sysInfo.Seccomp must be TRUE , else FALSE 69 if err := unix.Prctl(unix.PR_GET_SECCOMP, 0, 0, 0, 0); err != unix.EINVAL { 70 // Make sure the kernel has CONFIG_SECCOMP_FILTER. 71 if err := unix.Prctl(unix.PR_SET_SECCOMP, unix.SECCOMP_MODE_FILTER, 0, 0, 0); err != unix.EINVAL { 72 require.True(t, sysInfo.Seccomp) 73 } 74 } else { 75 require.False(t, sysInfo.Seccomp) 76 } 77 } 78 79 func TestNewAppArmorEnabled(t *testing.T) { 80 // Check if AppArmor is supported. then it must be TRUE , else FALSE 81 if _, err := os.Stat("/sys/kernel/security/apparmor"); err != nil { 82 t.Skip("App Armor Must be Enabled") 83 } 84 85 sysInfo := New(true) 86 require.True(t, sysInfo.AppArmor) 87 } 88 89 func TestNewAppArmorDisabled(t *testing.T) { 90 // Check if AppArmor is supported. then it must be TRUE , else FALSE 91 if _, err := os.Stat("/sys/kernel/security/apparmor"); !os.IsNotExist(err) { 92 t.Skip("App Armor Must be Disabled") 93 } 94 95 sysInfo := New(true) 96 require.False(t, sysInfo.AppArmor) 97 } 98 99 func TestNumCPU(t *testing.T) { 100 cpuNumbers := NumCPU() 101 if cpuNumbers <= 0 { 102 t.Fatal("CPU returned must be greater than zero") 103 } 104 }