/* Copyright © 2008-2013 Jan-Marek Glogowski * Copyright © 2008-2013 Roger Leigh * * schroot is free software: you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * schroot is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see * . * *********************************************************************/ #include #include #include #include #include #include #include #include #include using sbuild::_; class ChrootLoopback : public ChrootBase { public: std::string loopback_file; ChrootLoopback(): ChrootBase("loopback"), loopback_file() { loopback_file = abs_testdata_dir; loopback_file.append("/loopback-file"); } void SetUp() { ChrootBase::SetUp(); ASSERT_NE(chroot, nullptr); ASSERT_NE(session, nullptr); ASSERT_EQ(source, nullptr); ASSERT_EQ(session_source, nullptr); #ifdef SBUILD_FEATURE_UNION ASSERT_NE(chroot_union, nullptr); ASSERT_NE(session_union, nullptr); ASSERT_NE(source_union, nullptr); ASSERT_NE(session_source_union, nullptr); #endif // SBUILD_FEATURE_UNION } virtual void setup_chroot_props (sbuild::chroot::chroot::ptr& chroot) { ChrootBase::setup_chroot_props(chroot); sbuild::chroot::facet::loopback::ptr loop = chroot->get_facet_strict(); ASSERT_NE(loop, nullptr); loop->set_filename(loopback_file); sbuild::chroot::facet::mountable::ptr pmnt(chroot->get_facet()); ASSERT_NE(pmnt, nullptr); pmnt->set_mount_options("-t jfs -o quota,rw"); pmnt->set_location("/squeeze"); } void setup_env_gen(sbuild::environment& expected) { setup_env_chroot(expected); expected.add("CHROOT_TYPE", "loopback"); expected.add("CHROOT_MOUNT_LOCATION", "/mnt/mount-location"); expected.add("CHROOT_LOCATION", "/squeeze"); expected.add("CHROOT_PATH", "/mnt/mount-location/squeeze"); expected.add("CHROOT_FILE", loopback_file); expected.add("CHROOT_MOUNT_OPTIONS", "-t jfs -o quota,rw"); } void setup_keyfile_loop(sbuild::keyfile &expected, std::string group) { expected.set_value(group, "type", "loopback"); expected.set_value(group, "file", loopback_file); expected.set_value(group, "location", "/squeeze"); expected.set_value(group, "mount-options", "-t jfs -o quota,rw"); } }; TEST_F(ChrootLoopback, File) { sbuild::chroot::facet::loopback::ptr loop = chroot->get_facet_strict(); ASSERT_NE(loop, nullptr); loop->set_filename("/dev/some/file"); ASSERT_EQ(loop->get_filename(), "/dev/some/file"); } TEST_F(ChrootLoopback, MountOptions) { sbuild::chroot::facet::mountable::ptr pmnt(chroot->get_facet()); ASSERT_NE(pmnt, nullptr); pmnt->set_mount_options("-o opt1,opt2"); ASSERT_EQ(pmnt->get_mount_options(), "-o opt1,opt2"); } TEST_F(ChrootLoopback, SetupEnv) { sbuild::environment expected; setup_env_gen(expected); expected.add("CHROOT_SESSION_CLONE", "false"); expected.add("CHROOT_SESSION_CREATE", "true"); expected.add("CHROOT_SESSION_PURGE", "false"); #ifdef SBUILD_FEATURE_UNION expected.add("CHROOT_UNION_TYPE", "none"); #endif // SBUILD_FEATURE_UNION ChrootBase::test_setup_env(chroot, expected); } TEST_F(ChrootLoopback, SetupEnvSession) { sbuild::environment expected; setup_env_gen(expected); expected.add("SESSION_ID", "test-session-name"); expected.add("CHROOT_ALIAS", "test-session-name"); expected.add("CHROOT_DESCRIPTION", chroot->get_description() + ' ' + _("(session chroot)")); expected.add("CHROOT_SESSION_CLONE", "false"); expected.add("CHROOT_SESSION_CREATE", "false"); expected.add("CHROOT_SESSION_PURGE", "false"); expected.add("CHROOT_MOUNT_DEVICE", loopback_file); #ifdef SBUILD_FEATURE_UNION expected.add("CHROOT_UNION_TYPE", "none"); #endif // SBUILD_FEATURE_UNION ChrootBase::test_setup_env(session, expected); } #ifdef SBUILD_FEATURE_UNION TEST_F(ChrootLoopback, SetupEnvUnion) { sbuild::environment expected; setup_env_gen(expected); expected.add("CHROOT_SESSION_CLONE", "true"); expected.add("CHROOT_SESSION_CREATE", "true"); expected.add("CHROOT_SESSION_PURGE", "false"); expected.add("CHROOT_UNION_TYPE", "aufs"); expected.add("CHROOT_UNION_MOUNT_OPTIONS", "union-mount-options"); expected.add("CHROOT_UNION_OVERLAY_DIRECTORY", "/overlay"); expected.add("CHROOT_UNION_UNDERLAY_DIRECTORY", "/underlay"); ChrootBase::test_setup_env(chroot_union, expected); } TEST_F(ChrootLoopback, SetupEnvSessionUnion) { sbuild::environment expected; setup_env_gen(expected); expected.add("SESSION_ID", "test-union-session-name"); expected.add("CHROOT_ALIAS", "test-union-session-name"); expected.add("CHROOT_DESCRIPTION", chroot->get_description() + ' ' + _("(session chroot)")); expected.add("CHROOT_SESSION_CLONE", "false"); expected.add("CHROOT_SESSION_CREATE", "false"); expected.add("CHROOT_SESSION_PURGE", "true"); expected.add("CHROOT_MOUNT_DEVICE", loopback_file); expected.add("CHROOT_UNION_TYPE", "aufs"); expected.add("CHROOT_UNION_MOUNT_OPTIONS", "union-mount-options"); expected.add("CHROOT_UNION_OVERLAY_DIRECTORY", "/overlay/test-union-session-name"); expected.add("CHROOT_UNION_UNDERLAY_DIRECTORY", "/underlay/test-union-session-name"); ChrootBase::test_setup_env(session_union, expected); } TEST_F(ChrootLoopback, SetupEnvSourceUnion) { sbuild::environment expected; setup_env_gen(expected); expected.add("CHROOT_NAME", "test-name"); expected.add("CHROOT_DESCRIPTION", chroot->get_description() + ' ' + _("(source chroot)")); expected.add("CHROOT_SESSION_CLONE", "false"); expected.add("CHROOT_SESSION_CREATE", "true"); expected.add("CHROOT_SESSION_PURGE", "false"); ChrootBase::test_setup_env(source_union, expected); } TEST_F(ChrootLoopback, SetupEnvSessionSourceUnion) { sbuild::environment expected; setup_env_gen(expected); expected.add("SESSION_ID", "test-session-name"); expected.add("CHROOT_ALIAS", "test-session-name"); expected.add("CHROOT_NAME", "test-name"); expected.add("CHROOT_DESCRIPTION", chroot->get_description() + ' ' + _("(source chroot) (session chroot)")); expected.add("CHROOT_MOUNT_DEVICE", loopback_file); expected.add("CHROOT_SESSION_CLONE", "false"); expected.add("CHROOT_SESSION_CREATE", "false"); expected.add("CHROOT_SESSION_PURGE", "false"); ChrootBase::test_setup_env(session_source_union, expected); } #endif // SBUILD_FEATURE_UNION TEST_F(ChrootLoopback, SetupKeyfile) { sbuild::keyfile expected; const std::string group(chroot->get_name()); setup_keyfile_chroot(expected, group); setup_keyfile_loop(expected, group); #ifdef SBUILD_FEATURE_UNION setup_keyfile_union_unconfigured(expected, group); #endif // SBUILD_FEATURE_UNION ChrootBase::test_setup_keyfile (chroot, expected, group); } TEST_F(ChrootLoopback, SetupKeyfileSession) { sbuild::keyfile expected; const std::string group(session->get_name()); setup_keyfile_session(expected, group); setup_keyfile_loop(expected, group); expected.set_value(group, "name", "test-session-name"); expected.set_value(group, "selected-name", "test-session-name"); expected.set_value(group, "mount-device", loopback_file); expected.set_value(group, "mount-location", "/mnt/mount-location"); setup_keyfile_session_clone(expected, group); #ifdef SBUILD_FEATURE_UNION setup_keyfile_union_unconfigured(expected, group); #endif // SBUILD_FEATURE_UNION ChrootBase::test_setup_keyfile (session, expected, group); } #ifdef SBUILD_FEATURE_UNION TEST_F(ChrootLoopback, SetupKeyfileUnion) { sbuild::keyfile expected; const std::string group(chroot_union->get_name()); setup_keyfile_chroot(expected, group); setup_keyfile_source(expected, group); setup_keyfile_loop(expected, group); setup_keyfile_union_configured(expected, group); ChrootBase::test_setup_keyfile (chroot_union, expected, group); } TEST_F(ChrootLoopback, SetupKeyfileSessionUnion) { sbuild::keyfile expected; const std::string group(session_union->get_name()); setup_keyfile_session(expected, group); setup_keyfile_loop(expected, group); expected.set_value(group, "name", "test-union-session-name"); expected.set_value(group, "selected-name", "test-union-session-name"); expected.set_value(group, "mount-device", loopback_file); expected.set_value(group, "mount-location", "/mnt/mount-location"); setup_keyfile_session_clone(expected, group); setup_keyfile_union_session(expected, group); ChrootBase::test_setup_keyfile (session_union, expected, group); } TEST_F(ChrootLoopback, SetupKeyfileSourceUnion) { sbuild::keyfile expected; const std::string group(source_union->get_name()); setup_keyfile_chroot(expected, group); setup_keyfile_source_clone(expected, group); setup_keyfile_loop(expected, group); expected.set_value(group, "description", chroot->get_description() + ' ' + _("(source chroot)")); ChrootBase::test_setup_keyfile (source_union, expected, group); } TEST_F(ChrootLoopback, SetupKeyfileSessionSourceUnion) { sbuild::keyfile expected; const std::string group(source_union->get_name()); setup_keyfile_chroot(expected, group); setup_keyfile_session_source_clone(expected, group); setup_keyfile_loop(expected, group); expected.set_value(group, "description", chroot->get_description() + ' ' + _("(source chroot) (session chroot)")); expected.set_value(group, "mount-device", loopback_file); expected.set_value(group, "mount-location", "/mnt/mount-location"); ChrootBase::test_setup_keyfile (session_source_union, expected, group); } #endif // SBUILD_FEATURE_UNION TEST_F(ChrootLoopback, SessionFlags) { ASSERT_EQ(chroot->get_session_flags(), sbuild::chroot::facet::facet::SESSION_CREATE); ASSERT_EQ(session->get_session_flags(), sbuild::chroot::facet::facet::SESSION_NOFLAGS); #ifdef SBUILD_FEATURE_UNION ASSERT_EQ(chroot_union->get_session_flags(), (sbuild::chroot::facet::facet::SESSION_CREATE | sbuild::chroot::facet::facet::SESSION_CLONE)); ASSERT_EQ(session_union->get_session_flags(), sbuild::chroot::facet::facet::SESSION_PURGE); ASSERT_EQ(source_union->get_session_flags(), sbuild::chroot::facet::facet::SESSION_CREATE); #endif // SBUILD_FEATURE_UNION } TEST_F(ChrootLoopback, PrintDetails) { std::ostringstream os; os << chroot; // TODO: Compare output. ASSERT_FALSE(os.str().empty()); } TEST_F(ChrootLoopback, PrintConfig) { std::ostringstream os; sbuild::keyfile config; config << chroot; os << sbuild::keyfile_writer(config); // TODO: Compare output. ASSERT_FALSE(os.str().empty()); } TEST_F(ChrootLoopback, RunSetupScripts) { ASSERT_TRUE(chroot->get_run_setup_scripts()); }