Path: blob/main/test/tests/workspace/cgroup_v2_test.go
2496 views
// Copyright (c) 2021 Gitpod GmbH. All rights reserved.1// Licensed under the GNU Affero General Public License (AGPL).2// See License.AGPL.txt in the project root for license information.34package workspace56import (7"context"8"fmt"9"path/filepath"10"sort"11"strings"12"testing"13"time"1415"golang.org/x/exp/slices"16"sigs.k8s.io/e2e-framework/pkg/envconf"17"sigs.k8s.io/e2e-framework/pkg/features"1819agent "github.com/gitpod-io/gitpod/test/pkg/agent/workspace/api"20"github.com/gitpod-io/gitpod/test/pkg/integration"21"github.com/gitpod-io/gitpod/test/pkg/report"22)2324func TestCgroupV2(t *testing.T) {25f := features.New("cgroup v2").26WithLabel("component", "workspace").27Assess("it should have cgroup v2 enabled and create a new cgroup", func(testCtx context.Context, t *testing.T, cfg *envconf.Config) context.Context {28report.SetupReport(t, report.FeatureResourceLimit, "this is the test for cgroup v2")29t.Parallel()3031ctx, cancel := context.WithTimeout(testCtx, 5*time.Minute)32defer cancel()3334api := integration.NewComponentAPI(ctx, cfg.Namespace(), kubeconfig, cfg.Client())35t.Cleanup(func() {36api.Done(t)37})3839ws, stopWs, err := integration.LaunchWorkspaceDirectly(t, ctx, api)40if err != nil {41t.Fatal(err)42}43t.Cleanup(func() {44sctx, scancel := context.WithTimeout(context.Background(), 5*time.Minute)45defer scancel()4647sapi := integration.NewComponentAPI(sctx, cfg.Namespace(), kubeconfig, cfg.Client())48defer sapi.Done(t)4950_, err = stopWs(true, sapi)51if err != nil {52t.Fatal(err)53}54})5556rsa, closer, err := integration.Instrument(integration.ComponentWorkspace, "workspace", cfg.Namespace(), kubeconfig, cfg.Client(), integration.WithInstanceID(ws.Req.Id), integration.WithWorkspacekitLift(true))57if err != nil {58t.Fatalf("unexpected error instrumenting workspace: %v", err)59}60defer rsa.Close()61integration.DeferCloser(t, closer)6263cgv2, err := integration.IsCgroupV2(rsa)64if err != nil {65t.Fatalf("unexpected error checking cgroup v2: %v", err)66}67if !cgv2 {68t.Fatalf("expected cgroup v2 to be enabled")69}7071cgroupBase := "/sys/fs/cgroup/test"72var respNewCgroup agent.ExecResponse73err = rsa.Call("WorkspaceAgent.Exec", &agent.ExecRequest{74Dir: "/",75Command: "bash",76Args: []string{77"-c",78fmt.Sprintf("if [ ! -e %s ]; then sudo mkdir %s; fi", cgroupBase, cgroupBase),79},80}, &respNewCgroup)81if err != nil {82t.Fatalf("new cgroup create failed: %v\n%s\n%s", err, respNewCgroup.Stdout, respNewCgroup.Stderr)83}8485if respNewCgroup.ExitCode != 0 {86t.Fatalf("new cgroup create failed: %s\n%s", respNewCgroup.Stdout, respNewCgroup.Stderr)87}8889var respCheckControllers agent.ExecResponse90err = rsa.Call("WorkspaceAgent.Exec", &agent.ExecRequest{91Dir: "/",92Command: "bash",93Args: []string{94"-c",95fmt.Sprintf("cat %s", filepath.Join(cgroupBase, "cgroup.controllers")),96},97}, &respCheckControllers)98if err != nil {99t.Fatalf("cgroup v2 controllers check failed: %v\n%s\n%s", err, respCheckControllers.Stdout, respCheckControllers.Stderr)100}101102if respCheckControllers.ExitCode != 0 {103t.Fatalf("cgroup v2 controllers check failed: %s\n%s", respCheckControllers.Stdout, respCheckControllers.Stderr)104}105106expect := []string{107"cpuset",108"cpu",109"io",110"memory",111"pids",112}113sort.Strings(expect)114act := strings.Split(strings.TrimSuffix(respCheckControllers.Stdout, "\n"), " ")115sort.Strings(act)116117for _, resouce := range expect {118if !slices.Contains(act, resouce) {119t.Errorf("cgroup v2 controllers doesn't have %s", resouce)120}121}122123return testCtx124}).125Feature()126127testEnv.Test(t, f)128}129130131