Add a cgconfigparser test that verifies that the owner, group, file permissions, and directory permissions are properly set.
----------------------------------------------------------------- Test Results: Run Date: Mar 09 22:29:07 Passed: 1 test(s) Skipped: 0 test(s) Failed: 0 test(s) ----------------------------------------------------------------- Timing Results: Test Time (sec) --------------------------------------------------------- setup 20.58 019-cgconfig-uidgid_dperm_fperm.py 2.51 teardown 0.00 --------------------------------------------------------- Total Run Time 23.10 Signed-off-by: Tom Hromatka <tom.hroma...@oracle.com> --- ftests/019-cgconfig-uidgid_dperm_fperm.py | 138 ++++++++++++++++++++++ 1 file changed, 138 insertions(+) create mode 100755 ftests/019-cgconfig-uidgid_dperm_fperm.py diff --git a/ftests/019-cgconfig-uidgid_dperm_fperm.py b/ftests/019-cgconfig-uidgid_dperm_fperm.py new file mode 100755 index 000000000000..cd6c9dcb2921 --- /dev/null +++ b/ftests/019-cgconfig-uidgid_dperm_fperm.py @@ -0,0 +1,138 @@ +#!/usr/bin/env python3 +# +# cgconfigparser functionality test - '-a', '-d', '-f' flags +# +# Copyright (c) 2021 Oracle and/or its affiliates. +# Author: Tom Hromatka <tom.hroma...@oracle.com> +# + +# +# This library is free software; you can redistribute it and/or modify it +# under the terms of version 2.1 of the GNU Lesser General Public License as +# published by the Free Software Foundation. +# +# This library is distributed in the hope that it will be useful, but WITHOUT +# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or +# FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License +# for more details. +# +# You should have received a copy of the GNU Lesser General Public License +# along with this library; if not, see <http://www.gnu.org/licenses>. +# + +from cgroup import Cgroup, CgroupVersion +import consts +import ftests +import os +from run import Run +import sys +import utils + +CONTROLLER = 'cpuset' +CGNAME = '019cgconfig' + +CONFIG_FILE = '''group +{} {{ + {} {{ + }} +}}'''.format(CGNAME, CONTROLLER) + +USER = 'cguser019' +GROUP = 'cggroup019' +DPERM = '515' +FPERM = '246' + +CONFIG_FILE_NAME = os.path.join(os.getcwd(), '019cgconfig.conf') + +def prereqs(config): + result = consts.TEST_PASSED + cause = None + + return result, cause + +def setup(config): + f = open(CONFIG_FILE_NAME, 'w') + f.write(CONFIG_FILE) + f.close() + + if config.args.container: + config.container.run(['useradd', '-p', 'Test019#1', USER]) + config.container.run(['groupadd', GROUP]) + else: + Run.run(['sudo', 'useradd', '-p', 'Test019#1', USER]) + Run.run(['sudo', 'groupadd', GROUP]) + +def test(config): + result = consts.TEST_PASSED + cause = None + + Cgroup.configparser(config, load_file=CONFIG_FILE_NAME, dflt_usr=USER, + dflt_grp=GROUP, dperm=DPERM, fperm=FPERM) + + mnt_path = Cgroup.get_controller_mount_point(CONTROLLER) + cpus_path = os.path.join(mnt_path, CGNAME, 'cpuset.cpus') + + user = utils.get_file_owner_username(config, cpus_path) + group = utils.get_file_owner_group_name(config, cpus_path) + + if user != USER: + result = consts.TEST_FAILED + cause = "Owner name failed. Expected {}, received {}\n".format( + USER, user) + return result, cause + + if group != GROUP: + result = consts.TEST_FAILED + cause = "Owner group failed. Expected {}, received {}\n".format( + GROUP, group) + return result, cause + + fperm = utils.get_file_permissions(config, cpus_path) + if fperm != FPERM: + result = consts.TEST_FAILED + cause = "File permissions failed. Expected {}, received {}\n".format( + FPERM, fperm) + return result, cause + + dperm = utils.get_file_permissions(config, os.path.join(mnt_path, CGNAME)) + if dperm != DPERM: + result = consts.TEST_FAILED + cause = "Directory permissions failed. Expected {}, received {}\n".format( + DPERM, dperm) + return result, cause + + return result, cause + +def teardown(config): + os.remove(CONFIG_FILE_NAME) + + try: + if config.args.container: + config.container.run(['userdel', USER]) + config.container.run(['groupdel', GROUP]) + else: + Run.run(['sudo', 'userdel', USER]) + Run.run(['sudo', 'groupdel', GROUP]) + except: + pass + + Cgroup.delete(config, CONTROLLER, CGNAME) + +def main(config): + [result, cause] = prereqs(config) + if result != consts.TEST_PASSED: + return [result, cause] + + try: + setup(config) + [result, cause] = test(config) + finally: + teardown(config) + + return [result, cause] + +if __name__ == '__main__': + config = ftests.parse_args() + # this test was invoked directly. run only it + config.args.num = int(os.path.basename(__file__).split('-')[0]) + sys.exit(ftests.main(config)) -- 2.26.2 _______________________________________________ Libcg-devel mailing list Libcg-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/libcg-devel