mirror of
https://chromium.googlesource.com/crosvm/crosvm
synced 2024-11-24 12:34:31 +00:00
b803e3cdcf
These tests require root privileges to run. Check if we can do a passwordless sudo and run the test process as a child process with sudo. This will work in CI or dev_container. For developer workflows, the test_runner will already ask for sudo credentials before running tests. BUG=b:261600801 TEST=Fails: cargo test -p net_util Passes: sudo true && cargo test -p net_util Change-Id: I7c18057f7cfb91d5d389f9d9d1bb2d886d7f0149 Reviewed-on: https://chromium-review.googlesource.com/c/crosvm/crosvm/+/4086904 Auto-Submit: Dennis Kempin <denniskempin@google.com> Reviewed-by: Daniel Verkamp <dverkamp@chromium.org> Commit-Queue: Daniel Verkamp <dverkamp@chromium.org>
90 lines
2.3 KiB
Rust
90 lines
2.3 KiB
Rust
// Copyright 2022 The ChromiumOS Authors
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#![cfg(unix)]
|
|
|
|
use std::env::current_exe;
|
|
use std::net;
|
|
use std::process::Command;
|
|
|
|
use net_util::sys::unix::Tap;
|
|
use net_util::MacAddress;
|
|
use net_util::TapTCommon;
|
|
|
|
/// The tests below require root privileges.
|
|
/// Re-invoke the test binary to execute the specified test with sudo. The test will fail if
|
|
/// passwordless sudo is not available.
|
|
fn call_test_with_sudo(name: &str) {
|
|
// Try a passwordless sudo first to provide a proper error message.
|
|
// Note: The combination of SUDO_ASKPASS and --askpass will fail if sudo has to ask for a
|
|
// password.
|
|
let can_sudo = Command::new("sudo")
|
|
.args(&["--askpass", "true"])
|
|
.env("SUDO_ASKPASS", "false")
|
|
.output()
|
|
.unwrap();
|
|
if !can_sudo.status.success() {
|
|
panic!("This test need to be run as root or with passwordless sudo.");
|
|
}
|
|
|
|
let result = Command::new("sudo")
|
|
.args(&[
|
|
"--preserve-env",
|
|
current_exe().unwrap().to_str().unwrap(),
|
|
"--nocapture",
|
|
"--ignored",
|
|
"--exact",
|
|
name,
|
|
])
|
|
.status()
|
|
.unwrap();
|
|
|
|
if !result.success() {
|
|
panic!("Test {name} failed in child process.");
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn tap_create() {
|
|
call_test_with_sudo("tap_create_impl")
|
|
}
|
|
|
|
#[test]
|
|
#[ignore = "Only to be called by tap_create"]
|
|
fn tap_create_impl() {
|
|
Tap::new(true, false).unwrap();
|
|
}
|
|
|
|
#[test]
|
|
fn tap_configure() {
|
|
call_test_with_sudo("tap_configure_impl")
|
|
}
|
|
|
|
#[test]
|
|
#[ignore = "Only to be called by tap_configure"]
|
|
fn tap_configure_impl() {
|
|
let tap = Tap::new(true, false).unwrap();
|
|
let ip_addr: net::Ipv4Addr = "100.115.92.5".parse().unwrap();
|
|
let netmask: net::Ipv4Addr = "255.255.255.252".parse().unwrap();
|
|
let mac_addr: MacAddress = "a2:06:b9:3d:68:4d".parse().unwrap();
|
|
|
|
tap.set_ip_addr(ip_addr).unwrap();
|
|
tap.set_netmask(netmask).unwrap();
|
|
tap.set_mac_address(mac_addr).unwrap();
|
|
tap.set_vnet_hdr_size(16).unwrap();
|
|
tap.set_offload(0).unwrap();
|
|
}
|
|
|
|
#[test]
|
|
fn tap_enable() {
|
|
call_test_with_sudo("tap_enable_impl")
|
|
}
|
|
|
|
#[test]
|
|
#[ignore = "Only to be called by tap_enable"]
|
|
fn tap_enable_impl() {
|
|
let tap = Tap::new(true, false).unwrap();
|
|
|
|
tap.enable().unwrap();
|
|
}
|