123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117 |
- // +build linux
- /*
- Copyright 2015 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package procfs
- import (
- "io/ioutil"
- "os"
- "os/signal"
- "path/filepath"
- "regexp"
- "runtime"
- "syscall"
- "testing"
- "time"
- "github.com/stretchr/testify/assert"
- )
- func verifyContainerName(procCgroupText, expectedName string, expectedErr bool, t *testing.T) {
- name, err := containerNameFromProcCgroup(procCgroupText)
- if expectedErr && err == nil {
- t.Errorf("Expected error but did not get error in verifyContainerName")
- return
- } else if !expectedErr && err != nil {
- t.Errorf("Expected no error, but got error %+v in verifyContainerName", err)
- return
- } else if expectedErr {
- return
- }
- if name != expectedName {
- t.Errorf("Expected container name %s but got name %s", expectedName, name)
- }
- }
- func TestContainerNameFromProcCgroup(t *testing.T) {
- procCgroupValid := "2:devices:docker/kubelet"
- verifyContainerName(procCgroupValid, "docker/kubelet", false, t)
- procCgroupEmpty := ""
- verifyContainerName(procCgroupEmpty, "", true, t)
- content, err := ioutil.ReadFile("example_proc_cgroup")
- if err != nil {
- t.Errorf("Could not read example /proc cgroup file")
- }
- verifyContainerName(string(content), "/user/1000.user/c1.session", false, t)
- procCgroupNoDevice := "2:freezer:docker/kubelet\n5:cpuacct:pkg/kubectl"
- verifyContainerName(procCgroupNoDevice, "", true, t)
- procCgroupInvalid := "devices:docker/kubelet\ncpuacct:pkg/kubectl"
- verifyContainerName(procCgroupInvalid, "", true, t)
- }
- func TestPidOf(t *testing.T) {
- if runtime.GOOS == "darwin" || runtime.GOOS == "windows" {
- t.Skipf("not supported on GOOS=%s", runtime.GOOS)
- }
- pids, err := PidOf(filepath.Base(os.Args[0]))
- assert.Empty(t, err)
- assert.NotZero(t, pids)
- assert.Contains(t, pids, os.Getpid())
- }
- func TestPKill(t *testing.T) {
- if runtime.GOOS == "darwin" || runtime.GOOS == "windows" {
- t.Skipf("not supported on GOOS=%s", runtime.GOOS)
- }
- sig := syscall.SIGCONT
- c := make(chan os.Signal, 1)
- signal.Notify(c, sig)
- defer signal.Stop(c)
- PKill(os.Args[0], sig)
- select {
- case s := <-c:
- if s != sig {
- t.Fatalf("signal was %v, want %v", s, sig)
- }
- case <-time.After(1 * time.Second):
- t.Fatalf("timeout waiting for %v", sig)
- }
- }
- func BenchmarkGetPids(b *testing.B) {
- if runtime.GOOS == "darwin" || runtime.GOOS == "windows" {
- b.Skipf("not supported on GOOS=%s", runtime.GOOS)
- }
- re, err := regexp.Compile("(^|/)" + filepath.Base(os.Args[0]) + "$")
- assert.Empty(b, err)
- for i := 0; i < b.N; i++ {
- pids := getPids(re)
- b.StopTimer()
- assert.NotZero(b, pids)
- assert.Contains(b, pids, os.Getpid())
- b.StartTimer()
- }
- }
|