// +build !windows /* Copyright 2017 The Kubernetes Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package server import ( "os" "path/filepath" "testing" "github.com/containerd/typeurl" imagespec "github.com/opencontainers/image-spec/specs-go/v1" runtimespec "github.com/opencontainers/runtime-spec/specs-go" "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" runtime "k8s.io/cri-api/pkg/apis/runtime/v1alpha2" "github.com/containerd/cri/pkg/annotations" "github.com/containerd/cri/pkg/containerd/opts" ostesting "github.com/containerd/cri/pkg/os/testing" sandboxstore "github.com/containerd/cri/pkg/store/sandbox" ) func getRunPodSandboxTestData() (*runtime.PodSandboxConfig, *imagespec.ImageConfig, func(*testing.T, string, *runtimespec.Spec)) { config := &runtime.PodSandboxConfig{ Metadata: &runtime.PodSandboxMetadata{ Name: "test-name", Uid: "test-uid", Namespace: "test-ns", Attempt: 1, }, Hostname: "test-hostname", LogDirectory: "test-log-directory", Labels: map[string]string{"a": "b"}, Annotations: map[string]string{"c": "d"}, Linux: &runtime.LinuxPodSandboxConfig{ CgroupParent: "/test/cgroup/parent", }, } imageConfig := &imagespec.ImageConfig{ Env: []string{"a=b", "c=d"}, Entrypoint: []string{"/pause"}, Cmd: []string{"forever"}, WorkingDir: "/workspace", } specCheck := func(t *testing.T, id string, spec *runtimespec.Spec) { assert.Equal(t, "test-hostname", spec.Hostname) assert.Equal(t, getCgroupsPath("/test/cgroup/parent", id), spec.Linux.CgroupsPath) assert.Equal(t, relativeRootfsPath, spec.Root.Path) assert.Equal(t, true, spec.Root.Readonly) assert.Contains(t, spec.Process.Env, "a=b", "c=d") assert.Equal(t, []string{"/pause", "forever"}, spec.Process.Args) assert.Equal(t, "/workspace", spec.Process.Cwd) assert.EqualValues(t, *spec.Linux.Resources.CPU.Shares, opts.DefaultSandboxCPUshares) assert.EqualValues(t, *spec.Process.OOMScoreAdj, defaultSandboxOOMAdj) t.Logf("Check PodSandbox annotations") assert.Contains(t, spec.Annotations, annotations.SandboxID) assert.EqualValues(t, spec.Annotations[annotations.SandboxID], id) assert.Contains(t, spec.Annotations, annotations.ContainerType) assert.EqualValues(t, spec.Annotations[annotations.ContainerType], annotations.ContainerTypeSandbox) assert.Contains(t, spec.Annotations, annotations.SandboxLogDir) assert.EqualValues(t, spec.Annotations[annotations.SandboxLogDir], "test-log-directory") } return config, imageConfig, specCheck } func TestSandboxContainerSpec(t *testing.T) { testID := "test-id" nsPath := "test-cni" for desc, test := range map[string]struct { configChange func(*runtime.PodSandboxConfig) podAnnotations []string imageConfigChange func(*imagespec.ImageConfig) specCheck func(*testing.T, *runtimespec.Spec) expectErr bool }{ "spec should reflect original config": { specCheck: func(t *testing.T, spec *runtimespec.Spec) { // runtime spec should have expected namespaces enabled by default. require.NotNil(t, spec.Linux) assert.Contains(t, spec.Linux.Namespaces, runtimespec.LinuxNamespace{ Type: runtimespec.NetworkNamespace, Path: nsPath, }) assert.Contains(t, spec.Linux.Namespaces, runtimespec.LinuxNamespace{ Type: runtimespec.UTSNamespace, }) assert.Contains(t, spec.Linux.Namespaces, runtimespec.LinuxNamespace{ Type: runtimespec.PIDNamespace, }) assert.Contains(t, spec.Linux.Namespaces, runtimespec.LinuxNamespace{ Type: runtimespec.IPCNamespace, }) }, }, "host namespace": { configChange: func(c *runtime.PodSandboxConfig) { c.Linux.SecurityContext = &runtime.LinuxSandboxSecurityContext{ NamespaceOptions: &runtime.NamespaceOption{ Network: runtime.NamespaceMode_NODE, Pid: runtime.NamespaceMode_NODE, Ipc: runtime.NamespaceMode_NODE, }, } }, specCheck: func(t *testing.T, spec *runtimespec.Spec) { // runtime spec should disable expected namespaces in host mode. require.NotNil(t, spec.Linux) assert.NotContains(t, spec.Linux.Namespaces, runtimespec.LinuxNamespace{ Type: runtimespec.NetworkNamespace, }) assert.NotContains(t, spec.Linux.Namespaces, runtimespec.LinuxNamespace{ Type: runtimespec.UTSNamespace, }) assert.NotContains(t, spec.Linux.Namespaces, runtimespec.LinuxNamespace{ Type: runtimespec.PIDNamespace, }) assert.NotContains(t, spec.Linux.Namespaces, runtimespec.LinuxNamespace{ Type: runtimespec.IPCNamespace, }) }, }, "should return error when entrypoint and cmd are empty": { imageConfigChange: func(c *imagespec.ImageConfig) { c.Entrypoint = nil c.Cmd = nil }, expectErr: true, }, "should set supplemental groups correctly": { configChange: func(c *runtime.PodSandboxConfig) { c.Linux.SecurityContext = &runtime.LinuxSandboxSecurityContext{ SupplementalGroups: []int64{1111, 2222}, } }, specCheck: func(t *testing.T, spec *runtimespec.Spec) { require.NotNil(t, spec.Process) assert.Contains(t, spec.Process.User.AdditionalGids, uint32(1111)) assert.Contains(t, spec.Process.User.AdditionalGids, uint32(2222)) }, }, "a passthrough annotation should be passed as an OCI annotation": { podAnnotations: []string{"c"}, specCheck: func(t *testing.T, spec *runtimespec.Spec) { assert.Equal(t, spec.Annotations["c"], "d") }, }, "a non-passthrough annotation should not be passed as an OCI annotation": { configChange: func(c *runtime.PodSandboxConfig) { c.Annotations["d"] = "e" }, podAnnotations: []string{"c"}, specCheck: func(t *testing.T, spec *runtimespec.Spec) { assert.Equal(t, spec.Annotations["c"], "d") _, ok := spec.Annotations["d"] assert.False(t, ok) }, }, "passthrough annotations should support wildcard match": { configChange: func(c *runtime.PodSandboxConfig) { c.Annotations["t.f"] = "j" c.Annotations["z.g"] = "o" c.Annotations["z"] = "o" c.Annotations["y.ca"] = "b" c.Annotations["y"] = "b" }, podAnnotations: []string{"t*", "z.*", "y.c*"}, specCheck: func(t *testing.T, spec *runtimespec.Spec) { assert.Equal(t, spec.Annotations["t.f"], "j") assert.Equal(t, spec.Annotations["z.g"], "o") assert.Equal(t, spec.Annotations["y.ca"], "b") _, ok := spec.Annotations["y"] assert.False(t, ok) _, ok = spec.Annotations["z"] assert.False(t, ok) }, }, } { t.Logf("TestCase %q", desc) c := newTestCRIService() config, imageConfig, specCheck := getRunPodSandboxTestData() if test.configChange != nil { test.configChange(config) } if test.imageConfigChange != nil { test.imageConfigChange(imageConfig) } spec, err := c.sandboxContainerSpec(testID, config, imageConfig, nsPath, test.podAnnotations) if test.expectErr { assert.Error(t, err) assert.Nil(t, spec) continue } assert.NoError(t, err) assert.NotNil(t, spec) specCheck(t, testID, spec) if test.specCheck != nil { test.specCheck(t, spec) } } } func TestSetupSandboxFiles(t *testing.T) { const ( testID = "test-id" realhostname = "test-real-hostname" ) for desc, test := range map[string]struct { dnsConfig *runtime.DNSConfig hostname string ipcMode runtime.NamespaceMode expectedCalls []ostesting.CalledDetail }{ "should check host /dev/shm existence when ipc mode is NODE": { ipcMode: runtime.NamespaceMode_NODE, expectedCalls: []ostesting.CalledDetail{ { Name: "Hostname", }, { Name: "WriteFile", Arguments: []interface{}{ filepath.Join(testRootDir, sandboxesDir, testID, "hostname"), []byte(realhostname + "\n"), os.FileMode(0644), }, }, { Name: "CopyFile", Arguments: []interface{}{ "/etc/hosts", filepath.Join(testRootDir, sandboxesDir, testID, "hosts"), os.FileMode(0644), }, }, { Name: "CopyFile", Arguments: []interface{}{ "/etc/resolv.conf", filepath.Join(testRootDir, sandboxesDir, testID, "resolv.conf"), os.FileMode(0644), }, }, { Name: "Stat", Arguments: []interface{}{"/dev/shm"}, }, }, }, "should create new /etc/resolv.conf if DNSOptions is set": { dnsConfig: &runtime.DNSConfig{ Servers: []string{"8.8.8.8"}, Searches: []string{"114.114.114.114"}, Options: []string{"timeout:1"}, }, ipcMode: runtime.NamespaceMode_NODE, expectedCalls: []ostesting.CalledDetail{ { Name: "Hostname", }, { Name: "WriteFile", Arguments: []interface{}{ filepath.Join(testRootDir, sandboxesDir, testID, "hostname"), []byte(realhostname + "\n"), os.FileMode(0644), }, }, { Name: "CopyFile", Arguments: []interface{}{ "/etc/hosts", filepath.Join(testRootDir, sandboxesDir, testID, "hosts"), os.FileMode(0644), }, }, { Name: "WriteFile", Arguments: []interface{}{ filepath.Join(testRootDir, sandboxesDir, testID, "resolv.conf"), []byte(`search 114.114.114.114 nameserver 8.8.8.8 options timeout:1 `), os.FileMode(0644), }, }, { Name: "Stat", Arguments: []interface{}{"/dev/shm"}, }, }, }, "should create sandbox shm when ipc namespace mode is not NODE": { ipcMode: runtime.NamespaceMode_POD, expectedCalls: []ostesting.CalledDetail{ { Name: "Hostname", }, { Name: "WriteFile", Arguments: []interface{}{ filepath.Join(testRootDir, sandboxesDir, testID, "hostname"), []byte(realhostname + "\n"), os.FileMode(0644), }, }, { Name: "CopyFile", Arguments: []interface{}{ "/etc/hosts", filepath.Join(testRootDir, sandboxesDir, testID, "hosts"), os.FileMode(0644), }, }, { Name: "CopyFile", Arguments: []interface{}{ "/etc/resolv.conf", filepath.Join(testRootDir, sandboxesDir, testID, "resolv.conf"), os.FileMode(0644), }, }, { Name: "MkdirAll", Arguments: []interface{}{ filepath.Join(testStateDir, sandboxesDir, testID, "shm"), os.FileMode(0700), }, }, { Name: "Mount", // Ignore arguments which are too complex to check. }, }, }, "should create /etc/hostname when hostname is set": { hostname: "test-hostname", ipcMode: runtime.NamespaceMode_NODE, expectedCalls: []ostesting.CalledDetail{ { Name: "WriteFile", Arguments: []interface{}{ filepath.Join(testRootDir, sandboxesDir, testID, "hostname"), []byte("test-hostname\n"), os.FileMode(0644), }, }, { Name: "CopyFile", Arguments: []interface{}{ "/etc/hosts", filepath.Join(testRootDir, sandboxesDir, testID, "hosts"), os.FileMode(0644), }, }, { Name: "CopyFile", Arguments: []interface{}{ "/etc/resolv.conf", filepath.Join(testRootDir, sandboxesDir, testID, "resolv.conf"), os.FileMode(0644), }, }, { Name: "Stat", Arguments: []interface{}{"/dev/shm"}, }, }, }, } { t.Logf("TestCase %q", desc) c := newTestCRIService() c.os.(*ostesting.FakeOS).HostnameFn = func() (string, error) { return realhostname, nil } cfg := &runtime.PodSandboxConfig{ Hostname: test.hostname, DnsConfig: test.dnsConfig, Linux: &runtime.LinuxPodSandboxConfig{ SecurityContext: &runtime.LinuxSandboxSecurityContext{ NamespaceOptions: &runtime.NamespaceOption{ Ipc: test.ipcMode, }, }, }, } c.setupSandboxFiles(testID, cfg) calls := c.os.(*ostesting.FakeOS).GetCalls() assert.Len(t, calls, len(test.expectedCalls)) for i, expected := range test.expectedCalls { if expected.Arguments == nil { // Ignore arguments. expected.Arguments = calls[i].Arguments } assert.Equal(t, expected, calls[i]) } } } func TestParseDNSOption(t *testing.T) { for desc, test := range map[string]struct { servers []string searches []string options []string expectedContent string expectErr bool }{ "empty dns options should return empty content": {}, "non-empty dns options should return correct content": { servers: []string{"8.8.8.8", "server.google.com"}, searches: []string{"114.114.114.114"}, options: []string{"timeout:1"}, expectedContent: `search 114.114.114.114 nameserver 8.8.8.8 nameserver server.google.com options timeout:1 `, }, "should return error if dns search exceeds limit(6)": { searches: []string{ "server0.google.com", "server1.google.com", "server2.google.com", "server3.google.com", "server4.google.com", "server5.google.com", "server6.google.com", }, expectErr: true, }, } { t.Logf("TestCase %q", desc) resolvContent, err := parseDNSOptions(test.servers, test.searches, test.options) if test.expectErr { assert.Error(t, err) continue } assert.NoError(t, err) assert.Equal(t, resolvContent, test.expectedContent) } } // TODO(windows): Move this to sandbox_run_test.go func TestTypeurlMarshalUnmarshalSandboxMeta(t *testing.T) { for desc, test := range map[string]struct { configChange func(*runtime.PodSandboxConfig) }{ "should marshal original config": {}, "should marshal Linux": { configChange: func(c *runtime.PodSandboxConfig) { c.Linux.SecurityContext = &runtime.LinuxSandboxSecurityContext{ NamespaceOptions: &runtime.NamespaceOption{ Network: runtime.NamespaceMode_NODE, Pid: runtime.NamespaceMode_NODE, Ipc: runtime.NamespaceMode_NODE, }, SupplementalGroups: []int64{1111, 2222}, } }, }, } { t.Logf("TestCase %q", desc) meta := &sandboxstore.Metadata{ ID: "1", Name: "sandbox_1", NetNSPath: "/home/cloud", } meta.Config, _, _ = getRunPodSandboxTestData() if test.configChange != nil { test.configChange(meta.Config) } any, err := typeurl.MarshalAny(meta) assert.NoError(t, err) data, err := typeurl.UnmarshalAny(any) assert.NoError(t, err) assert.IsType(t, &sandboxstore.Metadata{}, data) curMeta, ok := data.(*sandboxstore.Metadata) assert.True(t, ok) assert.Equal(t, meta, curMeta) } } func TestSandboxDisableCgroup(t *testing.T) { config, imageConfig, _ := getRunPodSandboxTestData() c := newTestCRIService() c.config.DisableCgroup = true spec, err := c.sandboxContainerSpec("test-id", config, imageConfig, "test-cni", []string{}) require.NoError(t, err) t.Log("resource limit should not be set") assert.Nil(t, spec.Linux.Resources.Memory) assert.Nil(t, spec.Linux.Resources.CPU) t.Log("cgroup path should be empty") assert.Empty(t, spec.Linux.CgroupsPath) } // TODO(random-liu): [P1] Add unit test for different error cases to make sure // the function cleans up on error properly.