@@ -91,16 +91,14 @@ func fsSafeTestName(tb testing.TB) string {
91
91
}
92
92
93
93
func testJailer (t * testing.T , jailerConfig * proto.JailerConfig ) {
94
- require := require .New (t )
95
-
96
94
client , err := containerd .New (integtest .ContainerdSockPath , containerd .WithDefaultRuntime (firecrackerRuntime ))
97
- require .NoError (err , "unable to create client to containerd service at %s, is containerd running?" , integtest .ContainerdSockPath )
95
+ require .NoError (t , err , "unable to create client to containerd service at %s, is containerd running?" , integtest .ContainerdSockPath )
98
96
defer client .Close ()
99
97
100
98
ctx := namespaces .WithNamespace (context .Background (), "default" )
101
99
102
100
image , err := alpineImage (ctx , client , defaultSnapshotterName )
103
- require .NoError (err , "failed to get alpine image" )
101
+ require .NoError (t , err , "failed to get alpine image" )
104
102
105
103
vmID := testNameToVMID (t .Name ())
106
104
@@ -120,30 +118,30 @@ func testJailer(t *testing.T, jailerConfig *proto.JailerConfig) {
120
118
// If the drive files are bind-mounted, the files must be readable from the jailer's user.
121
119
if jailerConfig != nil && jailerConfig .DriveExposePolicy == proto .DriveExposePolicy_BIND {
122
120
f , err := os .CreateTemp ("" , fsSafeTestName (t )+ "_rootfs" )
123
- require .NoError (err )
121
+ require .NoError (t , err )
124
122
defer f .Close ()
125
123
126
124
dst := f .Name ()
127
125
128
126
// Copy the root drive before chown, since the file is used by other tests.
129
127
err = copyFile (integtest .DefaultRuntimeConfig .RootDrive , dst , 0400 )
130
- require .NoErrorf (err , "failed to copy a rootfs as %q" , dst )
128
+ require .NoErrorf (t , err , "failed to copy a rootfs as %q" , dst )
131
129
132
130
err = os .Chown (dst , int (jailerConfig .UID ), int (jailerConfig .GID ))
133
- require .NoError (err , "failed to chown %q" , dst )
131
+ require .NoError (t , err , "failed to chown %q" , dst )
134
132
135
133
request .RootDrive = & proto.FirecrackerRootDrive {HostPath : dst }
136
134
137
135
// The additional drive file is only used by this test.
138
136
err = os .Chown (additionalDrive , int (jailerConfig .UID ), int (jailerConfig .GID ))
139
- require .NoError (err , "failed to chown %q" , additionalDrive )
137
+ require .NoError (t , err , "failed to chown %q" , additionalDrive )
140
138
}
141
139
142
140
fcClient , err := integtest .NewFCControlClient (integtest .ContainerdSockPath )
143
- require .NoError (err )
141
+ require .NoError (t , err )
144
142
145
143
_ , err = fcClient .CreateVM (ctx , & request )
146
- require .NoError (err )
144
+ require .NoError (t , err )
147
145
148
146
c , err := client .NewContainer (ctx ,
149
147
vmID + "-container" ,
@@ -161,27 +159,27 @@ func testJailer(t *testing.T, jailerConfig *proto.JailerConfig) {
161
159
}}),
162
160
),
163
161
)
164
- require .NoError (err )
162
+ require .NoError (t , err )
165
163
166
164
stdout := startAndWaitTask (ctx , t , c )
167
- require .Equal ("hello\n additional drive\n " , stdout )
165
+ require .Equal (t , "hello\n additional drive\n " , stdout )
168
166
169
167
stat , err := os .Stat (filepath .Join (integtest .ShimBaseDir (), "default#" + vmID ))
170
- require .NoError (err )
168
+ require .NoError (t , err )
171
169
assert .True (t , stat .IsDir ())
172
170
173
171
err = c .Delete (ctx , containerd .WithSnapshotCleanup )
174
- require .NoError (err , "failed to delete a container" )
172
+ require .NoError (t , err , "failed to delete a container" )
175
173
176
174
_ , err = fcClient .StopVM (ctx , & proto.StopVMRequest {VMID : vmID })
177
- require .NoError (err )
175
+ require .NoError (t , err )
178
176
179
177
_ , err = os .Stat (filepath .Join (integtest .ShimBaseDir (), "default#" + vmID ))
180
178
assert .Error (t , err )
181
179
assert .True (t , os .IsNotExist (err ))
182
180
183
181
shimContents , err := os .ReadDir (integtest .ShimBaseDir ())
184
- require .NoError (err )
182
+ require .NoError (t , err )
185
183
assert .Len (t , shimContents , 0 )
186
184
}
187
185
@@ -199,28 +197,27 @@ func TestJailerCPUSet_Isolated(t *testing.T) {
199
197
testJailer (t , config )
200
198
}
201
199
202
- func testAttachBlockDevice (t * testing.T , jailerConfig * proto.JailerConfig ) {
203
- require := require .New (t )
200
+ func testAttachBlockDevice (tb testing.TB , jailerConfig * proto.JailerConfig ) {
204
201
client , err := containerd .New (integtest .ContainerdSockPath , containerd .WithDefaultRuntime (firecrackerRuntime ))
205
- require .NoError (err , "unable to create client to containerd service at %s, is containerd running?" , integtest .ContainerdSockPath )
202
+ require .NoError (tb , err , "unable to create client to containerd service at %s, is containerd running?" , integtest .ContainerdSockPath )
206
203
defer client .Close ()
207
204
208
205
ctx := namespaces .WithNamespace (context .Background (), "default" )
209
206
210
207
image , err := alpineImage (ctx , client , defaultSnapshotterName )
211
- require .NoError (err , "failed to get alpine image" )
208
+ require .NoError (tb , err , "failed to get alpine image" )
212
209
213
210
fcClient , err := integtest .NewFCControlClient (integtest .ContainerdSockPath )
214
- require .NoError (err )
211
+ require .NoError (tb , err )
215
212
216
- vmID := testNameToVMID (t .Name ())
213
+ vmID := testNameToVMID (tb .Name ())
217
214
218
- device , cleanup := internal .CreateBlockDevice (ctx , t )
215
+ device , cleanup := internal .CreateBlockDevice (ctx , tb )
219
216
defer cleanup ()
220
217
221
218
if jailerConfig != nil {
222
219
err := os .Chown (device , int (jailerConfig .UID ), int (jailerConfig .GID ))
223
- require .NoError (err )
220
+ require .NoError (tb , err )
224
221
}
225
222
226
223
request := proto.CreateVMRequest {
@@ -233,27 +230,27 @@ func testAttachBlockDevice(t *testing.T, jailerConfig *proto.JailerConfig) {
233
230
234
231
// If the drive files are bind-mounted, the files must be readable from the jailer's user.
235
232
if jailerConfig != nil && jailerConfig .DriveExposePolicy == proto .DriveExposePolicy_BIND {
236
- f , err := os .CreateTemp ("" , fsSafeTestName (t )+ "_rootfs" )
237
- require .NoError (err )
233
+ f , err := os .CreateTemp ("" , fsSafeTestName (tb )+ "_rootfs" )
234
+ require .NoError (tb , err )
238
235
defer f .Close ()
239
236
240
237
dst := f .Name ()
241
238
242
239
// Copy the root drive before chown, since the file is used by other tests.
243
240
err = copyFile (integtest .DefaultRuntimeConfig .RootDrive , dst , 0400 )
244
- require .NoErrorf (err , "failed to copy a rootfs as %q" , dst )
241
+ require .NoErrorf (tb , err , "failed to copy a rootfs as %q" , dst )
245
242
246
243
err = os .Chown (dst , int (jailerConfig .UID ), int (jailerConfig .GID ))
247
- require .NoError (err , "failed to chown %q" , dst )
244
+ require .NoError (tb , err , "failed to chown %q" , dst )
248
245
249
246
request .RootDrive = & proto.FirecrackerRootDrive {HostPath : dst }
250
247
251
248
err = os .Chown (device , int (jailerConfig .UID ), int (jailerConfig .GID ))
252
- require .NoError (err , "failed to chown %q" , device )
249
+ require .NoError (tb , err , "failed to chown %q" , device )
253
250
}
254
251
255
252
_ , err = fcClient .CreateVM (ctx , & request )
256
- require .NoError (err )
253
+ require .NoError (tb , err )
257
254
258
255
// create a container to test bind mount block device into the container
259
256
c , err := client .NewContainer (ctx ,
@@ -272,26 +269,26 @@ func testAttachBlockDevice(t *testing.T, jailerConfig *proto.JailerConfig) {
272
269
}}),
273
270
),
274
271
)
275
- require .NoError (err )
272
+ require .NoError (tb , err )
276
273
277
- stdout := startAndWaitTask (ctx , t , c )
278
- require .Equal ("heyhey\n " , stdout )
274
+ stdout := startAndWaitTask (ctx , tb , c )
275
+ require .Equal (tb , "heyhey\n " , stdout )
279
276
280
277
stat , err := os .Stat (filepath .Join (integtest .ShimBaseDir (), "default#" + vmID ))
281
- require .NoError (err )
282
- assert .True (t , stat .IsDir ())
278
+ require .NoError (tb , err )
279
+ assert .True (tb , stat .IsDir ())
283
280
284
281
err = c .Delete (ctx , containerd .WithSnapshotCleanup )
285
- require .NoError (err , "failed to delete a container-block-device" )
282
+ require .NoError (tb , err , "failed to delete a container-block-device" )
286
283
287
284
_ , err = fcClient .StopVM (ctx , & proto.StopVMRequest {VMID : vmID })
288
- require .NoError (err )
285
+ require .NoError (tb , err )
289
286
290
287
_ , err = os .Stat (filepath .Join (integtest .ShimBaseDir (), "default#" + vmID ))
291
- assert .Error (t , err )
292
- assert .True (t , os .IsNotExist (err ))
288
+ assert .Error (tb , err )
289
+ assert .True (tb , os .IsNotExist (err ))
293
290
294
291
shimContents , err := os .ReadDir (integtest .ShimBaseDir ())
295
- require .NoError (err )
296
- assert .Len (t , shimContents , 0 )
292
+ require .NoError (tb , err )
293
+ assert .Len (tb , shimContents , 0 )
297
294
}
0 commit comments