Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
gitpod-io
GitHub Repository: gitpod-io/gitpod
Path: blob/main/test/tests/workspace/cgroup_v2_test.go
2496 views
1
// Copyright (c) 2021 Gitpod GmbH. All rights reserved.
2
// Licensed under the GNU Affero General Public License (AGPL).
3
// See License.AGPL.txt in the project root for license information.
4
5
package workspace
6
7
import (
8
"context"
9
"fmt"
10
"path/filepath"
11
"sort"
12
"strings"
13
"testing"
14
"time"
15
16
"golang.org/x/exp/slices"
17
"sigs.k8s.io/e2e-framework/pkg/envconf"
18
"sigs.k8s.io/e2e-framework/pkg/features"
19
20
agent "github.com/gitpod-io/gitpod/test/pkg/agent/workspace/api"
21
"github.com/gitpod-io/gitpod/test/pkg/integration"
22
"github.com/gitpod-io/gitpod/test/pkg/report"
23
)
24
25
func TestCgroupV2(t *testing.T) {
26
f := features.New("cgroup v2").
27
WithLabel("component", "workspace").
28
Assess("it should have cgroup v2 enabled and create a new cgroup", func(testCtx context.Context, t *testing.T, cfg *envconf.Config) context.Context {
29
report.SetupReport(t, report.FeatureResourceLimit, "this is the test for cgroup v2")
30
t.Parallel()
31
32
ctx, cancel := context.WithTimeout(testCtx, 5*time.Minute)
33
defer cancel()
34
35
api := integration.NewComponentAPI(ctx, cfg.Namespace(), kubeconfig, cfg.Client())
36
t.Cleanup(func() {
37
api.Done(t)
38
})
39
40
ws, stopWs, err := integration.LaunchWorkspaceDirectly(t, ctx, api)
41
if err != nil {
42
t.Fatal(err)
43
}
44
t.Cleanup(func() {
45
sctx, scancel := context.WithTimeout(context.Background(), 5*time.Minute)
46
defer scancel()
47
48
sapi := integration.NewComponentAPI(sctx, cfg.Namespace(), kubeconfig, cfg.Client())
49
defer sapi.Done(t)
50
51
_, err = stopWs(true, sapi)
52
if err != nil {
53
t.Fatal(err)
54
}
55
})
56
57
rsa, closer, err := integration.Instrument(integration.ComponentWorkspace, "workspace", cfg.Namespace(), kubeconfig, cfg.Client(), integration.WithInstanceID(ws.Req.Id), integration.WithWorkspacekitLift(true))
58
if err != nil {
59
t.Fatalf("unexpected error instrumenting workspace: %v", err)
60
}
61
defer rsa.Close()
62
integration.DeferCloser(t, closer)
63
64
cgv2, err := integration.IsCgroupV2(rsa)
65
if err != nil {
66
t.Fatalf("unexpected error checking cgroup v2: %v", err)
67
}
68
if !cgv2 {
69
t.Fatalf("expected cgroup v2 to be enabled")
70
}
71
72
cgroupBase := "/sys/fs/cgroup/test"
73
var respNewCgroup agent.ExecResponse
74
err = rsa.Call("WorkspaceAgent.Exec", &agent.ExecRequest{
75
Dir: "/",
76
Command: "bash",
77
Args: []string{
78
"-c",
79
fmt.Sprintf("if [ ! -e %s ]; then sudo mkdir %s; fi", cgroupBase, cgroupBase),
80
},
81
}, &respNewCgroup)
82
if err != nil {
83
t.Fatalf("new cgroup create failed: %v\n%s\n%s", err, respNewCgroup.Stdout, respNewCgroup.Stderr)
84
}
85
86
if respNewCgroup.ExitCode != 0 {
87
t.Fatalf("new cgroup create failed: %s\n%s", respNewCgroup.Stdout, respNewCgroup.Stderr)
88
}
89
90
var respCheckControllers agent.ExecResponse
91
err = rsa.Call("WorkspaceAgent.Exec", &agent.ExecRequest{
92
Dir: "/",
93
Command: "bash",
94
Args: []string{
95
"-c",
96
fmt.Sprintf("cat %s", filepath.Join(cgroupBase, "cgroup.controllers")),
97
},
98
}, &respCheckControllers)
99
if err != nil {
100
t.Fatalf("cgroup v2 controllers check failed: %v\n%s\n%s", err, respCheckControllers.Stdout, respCheckControllers.Stderr)
101
}
102
103
if respCheckControllers.ExitCode != 0 {
104
t.Fatalf("cgroup v2 controllers check failed: %s\n%s", respCheckControllers.Stdout, respCheckControllers.Stderr)
105
}
106
107
expect := []string{
108
"cpuset",
109
"cpu",
110
"io",
111
"memory",
112
"pids",
113
}
114
sort.Strings(expect)
115
act := strings.Split(strings.TrimSuffix(respCheckControllers.Stdout, "\n"), " ")
116
sort.Strings(act)
117
118
for _, resouce := range expect {
119
if !slices.Contains(act, resouce) {
120
t.Errorf("cgroup v2 controllers doesn't have %s", resouce)
121
}
122
}
123
124
return testCtx
125
}).
126
Feature()
127
128
testEnv.Test(t, f)
129
}
130
131