mirror of
https://github.com/minio/minio.git
synced 2024-12-26 07:05:55 -05:00
141 lines
3.1 KiB
Go
141 lines
3.1 KiB
Go
|
// +build linux
|
||
|
|
||
|
/*
|
||
|
* Minio Cloud Storage, (C) 2017 Minio, Inc.
|
||
|
*
|
||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
* you may not use this file except in compliance with the License.
|
||
|
* You may obtain a copy of the License at
|
||
|
*
|
||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||
|
*
|
||
|
* Unless required by applicable law or agreed to in writing, software
|
||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
* See the License for the specific language governing permissions and
|
||
|
* limitations under the License.
|
||
|
*/
|
||
|
|
||
|
package cgroup
|
||
|
|
||
|
import (
|
||
|
"io/ioutil"
|
||
|
"os"
|
||
|
"testing"
|
||
|
)
|
||
|
|
||
|
// Testing parsing correctness for various process cgroup files.
|
||
|
func TestProcCGroup(t *testing.T) {
|
||
|
tmpPath, err := ioutil.TempFile("", "cgroup")
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
defer os.Remove(tmpPath.Name())
|
||
|
|
||
|
cgroup := `
|
||
|
11:memory:/user.slice
|
||
|
10:blkio:/user.slice
|
||
|
9:hugetlb:/
|
||
|
8:net_cls,net_prio:/
|
||
|
7:perf_event:/
|
||
|
6:pids:/user.slice/user-1000.slice
|
||
|
5:devices:/user.slice
|
||
|
4:cpuset:/
|
||
|
3:cpu,cpuacct:/user.slice
|
||
|
2:freezer:/
|
||
|
1:name=systemd:/user.slice/user-1000.slice/session-1.scope
|
||
|
`
|
||
|
_, err = tmpPath.WriteString(cgroup)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
// Seek back to read from the beginning.
|
||
|
tmpPath.Seek(0, 0)
|
||
|
|
||
|
cg, err := parseProcCGroup(tmpPath)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
path := cg["memory"]
|
||
|
if len(path) == 0 {
|
||
|
t.Fatal("Path component cannot be empty")
|
||
|
}
|
||
|
|
||
|
if path != "/user.slice" {
|
||
|
t.Fatal("Path component cannot be empty")
|
||
|
}
|
||
|
|
||
|
path = cg["systemd"]
|
||
|
if path != "/user.slice/user-1000.slice/session-1.scope" {
|
||
|
t.Fatal("Path component cannot be empty")
|
||
|
}
|
||
|
|
||
|
// Mixed cgroups with different group names.
|
||
|
cgroup = `
|
||
|
11:memory:/newtest/newtest
|
||
|
10:blkio:/user.slice
|
||
|
9:hugetlb:/
|
||
|
8:net_cls,net_prio:/
|
||
|
7:perf_event:/
|
||
|
6:pids:/user.slice/user-1000.slice
|
||
|
5:devices:/user.slice
|
||
|
4:cpuset:/
|
||
|
3:cpu,cpuacct:/newtest/newtest
|
||
|
2:freezer:/
|
||
|
1:name=systemd:/user.slice/user-1000.slice/session-1.scope
|
||
|
`
|
||
|
|
||
|
// Seek back to read from the beginning.
|
||
|
tmpPath.Seek(0, 0)
|
||
|
|
||
|
_, err = tmpPath.WriteString(cgroup)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
// Seek back to read from the beginning.
|
||
|
tmpPath.Seek(0, 0)
|
||
|
|
||
|
cg, err = parseProcCGroup(tmpPath)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
path = cg["memory"]
|
||
|
if path != "/newtest/newtest" {
|
||
|
t.Fatal("Path component cannot be empty")
|
||
|
}
|
||
|
|
||
|
path = cg["systemd"]
|
||
|
if path != "/user.slice/user-1000.slice/session-1.scope" {
|
||
|
t.Fatal("Path component cannot be empty")
|
||
|
}
|
||
|
|
||
|
}
|
||
|
|
||
|
// Tests cgroup memory limit path construction.
|
||
|
func TestMemoryLimitPath(t *testing.T) {
|
||
|
testCases := []struct {
|
||
|
cgroupPath string
|
||
|
expectedPath string
|
||
|
}{
|
||
|
{
|
||
|
cgroupPath: "/user.slice",
|
||
|
expectedPath: "/sys/fs/cgroup/memory/user.slice/memory.limit_in_bytes",
|
||
|
},
|
||
|
{
|
||
|
cgroupPath: "/docker/testing",
|
||
|
expectedPath: "/sys/fs/cgroup/memory/memory.limit_in_bytes",
|
||
|
},
|
||
|
}
|
||
|
|
||
|
for i, testCase := range testCases {
|
||
|
actualPath := getMemoryLimitFilePath(testCase.cgroupPath)
|
||
|
if actualPath != testCase.expectedPath {
|
||
|
t.Fatalf("Test: %d: Expected: %s, got %s", i+1, testCase.expectedPath, actualPath)
|
||
|
}
|
||
|
}
|
||
|
}
|