Add OCI/Image Volume Source support

Signed-off-by: Shiming Zhang <wzshiming@hotmail.com>
This commit is contained in:
Shiming Zhang
2025-02-18 14:06:24 +08:00
committed by Liyi Meng
parent 63272c3b7a
commit a0bd8c6f2d
8 changed files with 460 additions and 5 deletions

View File

@@ -0,0 +1,161 @@
/*
Copyright The containerd Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package integration
import (
"fmt"
"os"
"path/filepath"
"runtime"
"testing"
"time"
"github.com/containerd/containerd/v2/integration/images"
"github.com/opencontainers/selinux/go-selinux"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
criruntime "k8s.io/cri-api/pkg/apis/runtime/v1"
)
func TestImageMount(t *testing.T) {
if runtime.GOOS != "linux" {
t.Skip("Only running on linux")
}
testImage := images.Get(images.Alpine)
testMountImage := images.Get(images.Pause)
mountPath := "/image-mount"
EnsureImageExists(t, testMountImage)
EnsureImageExists(t, testImage)
testImageMount(t, testImage, testMountImage, mountPath, []string{
"ls",
mountPath,
}, []string{
fmt.Sprintf("%s %s %s", criruntime.Stdout, criruntime.LogTagFull, "pause"),
})
}
func TestImageMountSELinux(t *testing.T) {
if runtime.GOOS != "linux" {
t.Skip("Only running on linux")
}
if !selinux.GetEnabled() {
t.Skip("SELinux is not enabled")
}
testImage := images.Get(images.ResourceConsumer)
testMountImage := images.Get(images.Pause)
mountPath := "/image-mount"
EnsureImageExists(t, testMountImage)
EnsureImageExists(t, testImage)
testImageMountSELinux(t, testImage, testMountImage, mountPath, "s0:c4,c5", "system_u:object_r:container_file_t:s0:c4,c5 pause")
testImageMountSELinux(t, testImage, testMountImage, mountPath, "s0:c200,c100", "system_u:object_r:container_file_t:s0:c100,c200 pause")
}
func testImageMountSELinux(t *testing.T, testImage, testMountImage, mountPath string, level string, want string) {
var (
containerName = "test-image-mount-container"
)
testPodLogDir := t.TempDir()
sb, sbConfig := PodSandboxConfigWithCleanup(t, "sandbox",
"image-mount",
WithHostNetwork,
WithSelinuxLevel(level),
WithPodLogDirectory(testPodLogDir),
)
containerConfig := ContainerConfig(
containerName,
testImage,
WithCommand("ls", "-Z", mountPath),
WithImageVolumeMount(testMountImage, mountPath),
WithLogPath(containerName),
)
cn, err := runtimeService.CreateContainer(sb, containerConfig, sbConfig)
require.NoError(t, err)
defer func() {
assert.NoError(t, runtimeService.RemoveContainer(cn))
}()
require.NoError(t, runtimeService.StartContainer(cn))
require.NoError(t, Eventually(func() (bool, error) {
s, err := runtimeService.ContainerStatus(cn)
if err != nil {
return false, err
}
if s.GetState() == criruntime.ContainerState_CONTAINER_EXITED {
return true, nil
}
return false, nil
}, time.Second, 30*time.Second))
content, err := os.ReadFile(filepath.Join(testPodLogDir, containerName))
assert.NoError(t, err)
checkContainerLog(t, string(content), []string{
fmt.Sprintf("%s %s %s", criruntime.Stdout, criruntime.LogTagFull, want),
})
}
func testImageMount(t *testing.T, testImage, testMountImage, mountPath string, cmd, want []string) {
var (
containerName = "test-image-mount-container"
)
testPodLogDir := t.TempDir()
sb, sbConfig := PodSandboxConfigWithCleanup(t, "sandbox",
"image-mount",
WithHostNetwork,
WithPodLogDirectory(testPodLogDir),
)
containerConfig := ContainerConfig(
containerName,
testImage,
WithCommand(cmd[0], cmd[1:]...),
WithImageVolumeMount(testMountImage, mountPath),
WithLogPath(containerName),
)
cn, err := runtimeService.CreateContainer(sb, containerConfig, sbConfig)
require.NoError(t, err)
defer func() {
assert.NoError(t, runtimeService.RemoveContainer(cn))
}()
require.NoError(t, runtimeService.StartContainer(cn))
require.NoError(t, Eventually(func() (bool, error) {
s, err := runtimeService.ContainerStatus(cn)
if err != nil {
return false, err
}
if s.GetState() == criruntime.ContainerState_CONTAINER_EXITED {
return true, nil
}
return false, nil
}, time.Second, 30*time.Second))
content, err := os.ReadFile(filepath.Join(testPodLogDir, containerName))
assert.NoError(t, err)
checkContainerLog(t, string(content), want)
}

View File

@@ -138,6 +138,22 @@ func WithHostNetwork(p *runtime.PodSandboxConfig) {
p.Linux.SecurityContext.NamespaceOptions.Network = runtime.NamespaceMode_NODE
}
// Set selinux level
func WithSelinuxLevel(level string) PodSandboxOpts {
return func(p *runtime.PodSandboxConfig) {
if p.Linux == nil {
p.Linux = &runtime.LinuxPodSandboxConfig{}
}
if p.Linux.SecurityContext == nil {
p.Linux.SecurityContext = &runtime.LinuxSandboxSecurityContext{}
}
if p.Linux.SecurityContext.SelinuxOptions == nil {
p.Linux.SecurityContext.SelinuxOptions = &runtime.SELinuxOption{}
}
p.Linux.SecurityContext.SelinuxOptions.Level = level
}
}
// Set pod userns.
func WithPodUserNs(containerID, hostID, length uint32) PodSandboxOpts {
return func(p *runtime.PodSandboxConfig) {
@@ -338,6 +354,27 @@ func WithIDMapVolumeMount(hostPath, containerPath string, uidMaps, gidMaps []*ru
}
}
func WithImageVolumeMount(image, containerPath string) ContainerOpts {
return WithIDMapImageVolumeMount(image, containerPath, nil, nil)
}
func WithIDMapImageVolumeMount(image string, containerPath string, uidMaps, gidMaps []*runtime.IDMapping) ContainerOpts {
return func(c *runtime.ContainerConfig) {
containerPath, _ = filepath.Abs(containerPath)
mount := &runtime.Mount{
ContainerPath: containerPath,
UidMappings: uidMaps,
GidMappings: gidMaps,
Image: &runtime.ImageSpec{
Image: image,
},
Readonly: true,
SelinuxRelabel: true,
}
c.Mounts = append(c.Mounts, mount)
}
}
func WithWindowsUsername(username string) ContainerOpts {
return func(c *runtime.ContainerConfig) {
if c.Windows == nil {