@@ -33,7 +33,7 @@ import (
33
33
const (
34
34
testTempDirPrefix = "init-docker-test-"
35
35
36
- expectedAgentBindsUnspecifiedPlatform = 21
36
+ expectedAgentBindsUnspecifiedPlatform = 20
37
37
expectedAgentBindsSuseUbuntuPlatform = 18
38
38
)
39
39
@@ -288,7 +288,7 @@ func validateCommonCreateContainerOptions(opts godocker.CreateContainerOptions,
288
288
t .Errorf ("Expected network mode to be %s, got %s" , networkMode , hostCfg .NetworkMode )
289
289
}
290
290
291
- if len (hostCfg .CapAdd ) != 2 {
291
+ if len (hostCfg .CapAdd ) != 3 {
292
292
t .Error ("Mismatch detected in added host config capabilities" )
293
293
}
294
294
@@ -827,21 +827,13 @@ func TestStartAgentWithExecBinds(t *testing.T) {
827
827
hostCapabilityExecResourcesDir := filepath .Join (hostResourcesRootDir , execCapabilityName )
828
828
containerCapabilityExecResourcesDir := filepath .Join (containerResourcesRootDir , execCapabilityName )
829
829
830
- // binaries
831
- hostBinDir := filepath .Join (hostCapabilityExecResourcesDir , execBinRelativePath )
832
- containerBinDir := filepath .Join (containerCapabilityExecResourcesDir , execBinRelativePath )
833
-
834
830
// config
835
831
hostConfigDir := filepath .Join (hostCapabilityExecResourcesDir , execConfigRelativePath )
836
832
containerConfigDir := filepath .Join (containerCapabilityExecResourcesDir , execConfigRelativePath )
837
833
838
- // certs
839
- hostCertsDir := filepath .Join (hostCapabilityExecResourcesDir , execCertsRelativePath )
840
- containerCertsDir := filepath .Join (containerCapabilityExecResourcesDir , execCertsRelativePath )
841
-
842
834
expectedExecBinds := []string {
843
- hostBinDir + ":" + containerBinDir + readOnly ,
844
- hostCertsDir + ":" + containerCertsDir + readOnly ,
835
+ hostResourcesRootDir + ":" + containerResourcesRootDir + readOnly ,
836
+ hostConfigDir + ":" + containerConfigDir ,
845
837
}
846
838
expectedAgentBinds += len (expectedExecBinds )
847
839
@@ -884,18 +876,10 @@ func TestGetCapabilityExecBinds(t *testing.T) {
884
876
hostCapabilityExecResourcesDir := filepath .Join (hostResourcesRootDir , execCapabilityName )
885
877
containerCapabilityExecResourcesDir := filepath .Join (containerResourcesRootDir , execCapabilityName )
886
878
887
- // binaries
888
- hostBinDir := filepath .Join (hostCapabilityExecResourcesDir , execBinRelativePath )
889
- containerBinDir := filepath .Join (containerCapabilityExecResourcesDir , execBinRelativePath )
890
-
891
879
// config
892
880
hostConfigDir := filepath .Join (hostCapabilityExecResourcesDir , execConfigRelativePath )
893
881
containerConfigDir := filepath .Join (containerCapabilityExecResourcesDir , execConfigRelativePath )
894
882
895
- // certs
896
- hostCertsDir := filepath .Join (hostCapabilityExecResourcesDir , execCertsRelativePath )
897
- containerCertsDir := filepath .Join (containerCapabilityExecResourcesDir , execCertsRelativePath )
898
-
899
883
testCases := []struct {
900
884
name string
901
885
testIsPathValid func (string , bool ) bool
@@ -907,35 +891,31 @@ func TestGetCapabilityExecBinds(t *testing.T) {
907
891
return true
908
892
},
909
893
expectedBinds : []string {
910
- hostBinDir + ":" + containerBinDir + readOnly ,
894
+ hostResourcesRootDir + ":" + containerResourcesRootDir + readOnly ,
911
895
hostConfigDir + ":" + containerConfigDir ,
912
- hostCertsDir + ":" + containerCertsDir + readOnly ,
913
896
},
914
897
},
915
898
{
916
- name : "only ssm-agent bin path valid" ,
899
+ name : "managed-agents path valid, no execute-command " ,
917
900
testIsPathValid : func (path string , isDir bool ) bool {
918
- return path == hostBinDir
901
+ return path == hostResourcesRootDir
919
902
},
920
903
expectedBinds : []string {
921
- hostBinDir + ":" + containerBinDir + readOnly ,
922
- hostConfigDir + ":" + containerConfigDir ,
904
+ hostResourcesRootDir + ":" + containerResourcesRootDir + readOnly ,
923
905
},
924
906
},
925
907
{
926
908
name : "no path valid" ,
927
909
testIsPathValid : func (path string , isDir bool ) bool {
928
910
return false
929
911
},
930
- expectedBinds : []string {
931
- hostConfigDir + ":" + containerConfigDir ,
932
- },
912
+ expectedBinds : []string {},
933
913
},
934
914
}
935
915
for _ , tc := range testCases {
936
916
t .Run (tc .name , func (t * testing.T ) {
937
917
isPathValid = tc .testIsPathValid
938
- binds := getCapabilityExecBinds ()
918
+ binds := getCapabilityBinds ()
939
919
assert .Equal (t , tc .expectedBinds , binds )
940
920
})
941
921
}
0 commit comments