Added a persistent volume test for linux filesystem isolator.

Review: https://reviews.apache.org/r/37334


Project: http://git-wip-us.apache.org/repos/asf/mesos/repo
Commit: http://git-wip-us.apache.org/repos/asf/mesos/commit/1ff6e269
Tree: http://git-wip-us.apache.org/repos/asf/mesos/tree/1ff6e269
Diff: http://git-wip-us.apache.org/repos/asf/mesos/diff/1ff6e269

Branch: refs/heads/master
Commit: 1ff6e269b70164409fec359644a1674cf02947cb
Parents: 0b3cdec
Author: Jie Yu <[email protected]>
Authored: Mon Aug 10 18:57:05 2015 -0700
Committer: Jie Yu <[email protected]>
Committed: Wed Aug 12 16:53:44 2015 -0700

----------------------------------------------------------------------
 .../containerizer/filesystem_isolator_tests.cpp | 64 ++++++++++++++++++++
 1 file changed, 64 insertions(+)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/mesos/blob/1ff6e269/src/tests/containerizer/filesystem_isolator_tests.cpp
----------------------------------------------------------------------
diff --git a/src/tests/containerizer/filesystem_isolator_tests.cpp 
b/src/tests/containerizer/filesystem_isolator_tests.cpp
index 98320ee..c00ac80 100644
--- a/src/tests/containerizer/filesystem_isolator_tests.cpp
+++ b/src/tests/containerizer/filesystem_isolator_tests.cpp
@@ -30,6 +30,8 @@
 #include <stout/path.hpp>
 #include <stout/uuid.hpp>
 
+#include "slave/paths.hpp"
+
 #ifdef __linux__
 #include "slave/containerizer/linux_launcher.hpp"
 
@@ -326,6 +328,68 @@ TEST_F(LinuxFilesystemIsolatorTest, 
ROOT_VolumeFromHostSandboxMountPoint)
   EXPECT_TRUE(wait.get().has_status());
   EXPECT_EQ(0, wait.get().status());
 }
+
+
+// This test verifies that persistent volumes are properly mounted in
+// the container's root filesystem.
+TEST_F(LinuxFilesystemIsolatorTest, ROOT_PersistentVolume)
+{
+  slave::Flags flags = CreateSlaveFlags();
+  flags.work_dir = os::getcwd();
+
+  Try<Owned<MesosContainerizer>> containerizer = createContainerizer(flags);
+  ASSERT_SOME(containerizer);
+
+  ContainerID containerId;
+  containerId.set_value(UUID::random().toString());
+
+  ExecutorInfo executor = CREATE_EXECUTOR_INFO(
+      "test_executor",
+      "echo abc > volume/file");
+
+  executor.add_resources()->CopyFrom(createPersistentVolume(
+      Megabytes(32),
+      "test_role",
+      "persistent_volume_id",
+      "volume"));
+
+  executor.mutable_container()->CopyFrom(createContainerInfo());
+
+  // Create a persistent volume.
+  string volume = slave::paths::getPersistentVolumePath(
+      os::getcwd(),
+      "test_role",
+      "persistent_volume_id");
+
+  ASSERT_SOME(os::mkdir(volume));
+
+  string directory = path::join(os::getcwd(), "sandbox");
+  ASSERT_SOME(os::mkdir(directory));
+
+  Future<bool> launch = containerizer.get()->launch(
+      containerId,
+      executor,
+      directory,
+      None(),
+      SlaveID(),
+      PID<Slave>(),
+      false);
+
+  // Wait for the launch to complete.
+  AWAIT_READY(launch);
+
+  // Wait on the container.
+  Future<containerizer::Termination> wait =
+    containerizer.get()->wait(containerId);
+
+  AWAIT_READY(wait);
+
+  // Check the executor exited correctly.
+  EXPECT_TRUE(wait.get().has_status());
+  EXPECT_EQ(0, wait.get().status());
+
+  EXPECT_SOME_EQ("abc\n", os::read(path::join(volume, "file")));
+}
 #endif // __linux__
 
 } // namespace tests {

Reply via email to