// Test the output when no binary can be found. func (s *KVMSuite) TestIsKVMSupportedKvmOkNotFound(c *gc.C) { // With no path, and no backup directory, we should fail. s.PatchEnvironment("PATH", "") s.PatchValue(kvm.KVMPath, "") supported, err := kvm.IsKVMSupported() c.Check(supported, jc.IsFalse) c.Assert(err, gc.ErrorMatches, "kvm-ok executable not found") }
// Test the case that kvm-ok is found in the path. func (s *KVMSuite) TestIsKVMSupportedOnlyPath(c *gc.C) { // Create a mocked binary so that this test does not fail for // developers without kvm-ok. tmpDir := c.MkDir() err := ioutil.WriteFile(filepath.Join(tmpDir, "kvm-ok"), []byte("#!/bin/bash"), 0777) s.PatchEnvironment("PATH", tmpDir) supported, err := kvm.IsKVMSupported() c.Check(supported, jc.IsTrue) c.Assert(err, jc.ErrorIsNil) }
// Test the output when the binary is found, but errors out. func (s *KVMSuite) TestIsKVMSupportedBinaryErrorsOut(c *gc.C) { // Clear path so real binary is not found. s.PatchEnvironment("PATH", "") // Create mocked binary which returns an error and give the test access. tmpDir := c.MkDir() err := ioutil.WriteFile(filepath.Join(tmpDir, "kvm-ok"), []byte("#!/bin/bash\nexit 127"), 0777) c.Assert(err, jc.ErrorIsNil) s.PatchValue(kvm.KVMPath, tmpDir) supported, err := kvm.IsKVMSupported() c.Check(supported, jc.IsFalse) c.Assert(err, gc.ErrorMatches, "exit status 127") }
// setupContainerSupport determines what containers can be run on this machine and // initialises suitable infrastructure to support such containers. func (a *MachineAgent) setupContainerSupport(runner worker.Runner, st *api.State, entity *apiagent.Entity, agentConfig agent.Config) error { var supportedContainers []instance.ContainerType // We don't yet support nested lxc containers but anything else can run an LXC container. if entity.ContainerType() != instance.LXC { supportedContainers = append(supportedContainers, instance.LXC) } supportsKvm, err := kvm.IsKVMSupported() if err != nil { logger.Warningf("determining kvm support: %v\nno kvm containers possible", err) } if err == nil && supportsKvm { supportedContainers = append(supportedContainers, instance.KVM) } return a.updateSupportedContainers(runner, st, entity.Tag(), supportedContainers, agentConfig) }
// setupContainerSupport determines what containers can be run on this machine and // initialises suitable infrastructure to support such containers. func (a *MachineAgent) setupContainerSupport(runner worker.Runner, st api.Connection, agentConfig agent.Config) error { var supportedContainers []instance.ContainerType supportsContainers := container.ContainersSupported() if supportsContainers { supportedContainers = append(supportedContainers, instance.LXC, instance.LXD) } supportsKvm, err := kvm.IsKVMSupported() if err != nil { logger.Warningf("determining kvm support: %v\nno kvm containers possible", err) } if err == nil && supportsKvm { supportedContainers = append(supportedContainers, instance.KVM) } return a.updateSupportedContainers(runner, st, supportedContainers, agentConfig) }