mirror of
https://github.com/containers/podman
synced 2024-10-20 17:23:30 +00:00
8368a894ba
Signed-off-by: Chris Evich <cevich@redhat.com>
77 lines
2.9 KiB
Bash
Executable file
77 lines
2.9 KiB
Bash
Executable file
#!/bin/bash
|
|
|
|
set -eo pipefail
|
|
|
|
source $(dirname $0)/lib.sh
|
|
|
|
EVIL_UNITS="$($CIRRUS_WORKING_DIR/$PACKER_BASE/systemd_banish.sh --list)"
|
|
|
|
req_env_var PACKER_BUILDER_NAME TEST_REMOTE_CLIENT EVIL_UNITS OS_RELEASE_ID
|
|
|
|
NFAILS=0
|
|
echo "Validating VM image"
|
|
|
|
MIN_SLASH_GIGS=30
|
|
read SLASH_DEVICE SLASH_FSTYPE SLASH_SIZE JUNK <<<$(findmnt --df --first-only --noheadings / | cut -d '.' -f 1)
|
|
SLASH_SIZE_GIGS=$(echo "$SLASH_SIZE" | sed -r -e 's/G|g//')
|
|
item_test "Minimum available disk space" $SLASH_SIZE_GIGS -gt $MIN_SLASH_GIGS || let "NFAILS+=1"
|
|
|
|
MIN_MEM_MB=2000
|
|
read JUNK TOTAL USED MEM_FREE JUNK <<<$(free -tm | tail -1)
|
|
item_test 'Minimum available memory' $MEM_FREE -ge $MIN_MEM_MB || let "NFAILS+=1"
|
|
|
|
# We're testing a custom-built podman; make sure there isn't a distro-provided
|
|
# binary anywhere; that could potentially taint our results.
|
|
item_test "remove_packaged_podman_files() did it's job" -z "$(type -P podman)" || let "NFAILS+=1"
|
|
|
|
# Integration Tests require varlink in Fedora
|
|
item_test "The varlink executable is present" -x "$(type -P varlink)" || let "NFAILS+=1"
|
|
|
|
MIN_ZIP_VER='3.0'
|
|
VER_RE='.+([[:digit:]]+\.[[:digit:]]+).+'
|
|
ACTUAL_VER=$(zip --version 2>&1 | egrep -m 1 "Zip$VER_RE" | sed -r -e "s/$VER_RE/\\1/")
|
|
item_test "minimum zip version" "$MIN_ZIP_VER" = $(echo -e "$MIN_ZIP_VER\n$ACTUAL_VER" | sort -V | head -1) || let "NFAILS+=1"
|
|
|
|
for REQ_UNIT in google-accounts-daemon.service \
|
|
google-clock-skew-daemon.service \
|
|
google-instance-setup.service \
|
|
google-network-daemon.service \
|
|
google-shutdown-scripts.service \
|
|
google-startup-scripts.service
|
|
do
|
|
item_test "required $REQ_UNIT enabled" \
|
|
"$(systemctl list-unit-files --no-legend $REQ_UNIT)" = "$REQ_UNIT enabled" || let "NFAILS+=1"
|
|
done
|
|
|
|
for evil_unit in $EVIL_UNITS
|
|
do
|
|
# Exits zero if any unit matching pattern is running
|
|
unit_status=$(systemctl is-active $evil_unit &> /dev/null; echo $?)
|
|
item_test "No $evil_unit unit is present or active:" "$unit_status" -ne "0" || let "NFAILS+=1"
|
|
done
|
|
|
|
if [[ "$OS_RELEASE_ID" == "ubuntu" ]] && [[ -x "/usr/lib/cri-o-runc/sbin/runc" ]]
|
|
then
|
|
SAMESAME=$(diff --brief /usr/lib/cri-o-runc/sbin/runc /usr/bin/runc &> /dev/null; echo $?)
|
|
item_test "On ubuntu /usr/bin/runc is /usr/lib/cri-o-runc/sbin/runc" "$SAMESAME" -eq "0" || let "NFAILS+=1"
|
|
fi
|
|
|
|
if [[ "$OS_RELEASE_ID" == "ubuntu" ]]
|
|
then
|
|
item_test "On ubuntu, no periodic apt crap is enabled" -z "$(egrep $PERIODIC_APT_RE /etc/apt/apt.conf.d/*)"
|
|
fi
|
|
|
|
echo "Checking items specific to ${PACKER_BUILDER_NAME}${BUILT_IMAGE_SUFFIX}"
|
|
case "$PACKER_BUILDER_NAME" in
|
|
xfedora*)
|
|
echo "Kernel Command-line: $(cat /proc/cmdline)"
|
|
item_test \
|
|
"On ${PACKER_BUILDER_NAME} images, the /sys/fs/cgroup/unified directory does NOT exist" \
|
|
"!" "-d" "/sys/fs/cgroup/unified" || let "NFAILS+=1"
|
|
;;
|
|
*) echo "No vm-image specific items to check"
|
|
esac
|
|
|
|
echo "Total failed tests: $NFAILS"
|
|
exit $NFAILS
|