
so that we can add a fakeSandboxService to the criService in tests. Signed-off-by: Abel Feng <fshb1988@gmail.com>
191 lines
5.8 KiB
Go
191 lines
5.8 KiB
Go
/*
|
|
Copyright The containerd Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package server
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"encoding/json"
|
|
"io"
|
|
"os"
|
|
"testing"
|
|
|
|
"github.com/containerd/go-cni"
|
|
"github.com/containerd/log"
|
|
"github.com/opencontainers/runtime-spec/specs-go"
|
|
"github.com/sirupsen/logrus"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
runtime "k8s.io/cri-api/pkg/apis/runtime/v1"
|
|
|
|
"github.com/containerd/containerd/v2/api/types"
|
|
"github.com/containerd/containerd/v2/errdefs"
|
|
"github.com/containerd/containerd/v2/oci"
|
|
criconfig "github.com/containerd/containerd/v2/pkg/cri/config"
|
|
containerstore "github.com/containerd/containerd/v2/pkg/cri/store/container"
|
|
"github.com/containerd/containerd/v2/pkg/cri/store/label"
|
|
sandboxstore "github.com/containerd/containerd/v2/pkg/cri/store/sandbox"
|
|
servertesting "github.com/containerd/containerd/v2/pkg/cri/testing"
|
|
ostesting "github.com/containerd/containerd/v2/pkg/os/testing"
|
|
"github.com/containerd/containerd/v2/pkg/registrar"
|
|
"github.com/containerd/containerd/v2/platforms"
|
|
"github.com/containerd/containerd/v2/sandbox"
|
|
)
|
|
|
|
type fakeSandboxService struct{}
|
|
|
|
func (f *fakeSandboxService) SandboxController(config *runtime.PodSandboxConfig, runtimeHandler string) (sandbox.Controller, error) {
|
|
return &fakeSandboxController{}, nil
|
|
}
|
|
|
|
type fakeSandboxController struct{}
|
|
|
|
func (f fakeSandboxController) Create(_ctx context.Context, _sandboxInfo sandbox.Sandbox, _opts ...sandbox.CreateOpt) error {
|
|
return errdefs.ErrNotImplemented
|
|
}
|
|
|
|
func (f fakeSandboxController) Start(ctx context.Context, sandboxID string) (sandbox.ControllerInstance, error) {
|
|
return sandbox.ControllerInstance{}, errdefs.ErrNotImplemented
|
|
}
|
|
|
|
func (f fakeSandboxController) Platform(_ctx context.Context, _sandboxID string) (platforms.Platform, error) {
|
|
return platforms.DefaultSpec(), nil
|
|
}
|
|
|
|
func (f fakeSandboxController) Stop(_ctx context.Context, _sandboxID string, _opts ...sandbox.StopOpt) error {
|
|
return errdefs.ErrNotImplemented
|
|
}
|
|
|
|
func (f fakeSandboxController) Wait(_ctx context.Context, _sandboxID string) (sandbox.ExitStatus, error) {
|
|
return sandbox.ExitStatus{}, errdefs.ErrNotImplemented
|
|
}
|
|
|
|
func (f fakeSandboxController) Status(_ctx context.Context, sandboxID string, _verbose bool) (sandbox.ControllerStatus, error) {
|
|
return sandbox.ControllerStatus{}, errdefs.ErrNotImplemented
|
|
}
|
|
|
|
func (f fakeSandboxController) Shutdown(ctx context.Context, sandboxID string) error {
|
|
return errdefs.ErrNotImplemented
|
|
}
|
|
|
|
func (f fakeSandboxController) Metrics(ctx context.Context, sandboxID string) (*types.Metric, error) {
|
|
return &types.Metric{}, errdefs.ErrNotImplemented
|
|
}
|
|
|
|
// newTestCRIService creates a fake criService for test.
|
|
func newTestCRIService() *criService {
|
|
labels := label.NewStore()
|
|
return &criService{
|
|
imageService: &fakeImageService{},
|
|
config: testConfig,
|
|
os: ostesting.NewFakeOS(),
|
|
sandboxStore: sandboxstore.NewStore(labels),
|
|
sandboxNameIndex: registrar.NewRegistrar(),
|
|
containerStore: containerstore.NewStore(labels),
|
|
containerNameIndex: registrar.NewRegistrar(),
|
|
netPlugin: map[string]cni.CNI{
|
|
defaultNetworkPlugin: servertesting.NewFakeCNIPlugin(),
|
|
},
|
|
sandboxService: &fakeSandboxService{},
|
|
}
|
|
}
|
|
|
|
func TestLoadBaseOCISpec(t *testing.T) {
|
|
spec := oci.Spec{Version: "1.0.2", Hostname: "default"}
|
|
|
|
file, err := os.CreateTemp("", "spec-test-")
|
|
require.NoError(t, err)
|
|
|
|
defer func() {
|
|
assert.NoError(t, file.Close())
|
|
assert.NoError(t, os.RemoveAll(file.Name()))
|
|
}()
|
|
|
|
err = json.NewEncoder(file).Encode(&spec)
|
|
assert.NoError(t, err)
|
|
|
|
config := criconfig.Config{}
|
|
config.Runtimes = map[string]criconfig.Runtime{
|
|
"runc": {BaseRuntimeSpec: file.Name()},
|
|
}
|
|
|
|
specs, err := loadBaseOCISpecs(&config)
|
|
assert.NoError(t, err)
|
|
|
|
assert.Len(t, specs, 1)
|
|
|
|
out, ok := specs[file.Name()]
|
|
assert.True(t, ok, "expected spec with file name %q", file.Name())
|
|
|
|
assert.Equal(t, "1.0.2", out.Version)
|
|
assert.Equal(t, "default", out.Hostname)
|
|
}
|
|
|
|
func Test_loadBaseOCISpecs(t *testing.T) {
|
|
spec := oci.Spec{
|
|
Version: "1.0.2",
|
|
Hostname: "default",
|
|
Process: &specs.Process{
|
|
Capabilities: &specs.LinuxCapabilities{
|
|
Inheritable: []string{"CAP_NET_RAW"},
|
|
},
|
|
},
|
|
}
|
|
file, err := os.CreateTemp("", "spec-test-")
|
|
require.NoError(t, err)
|
|
defer func() {
|
|
assert.NoError(t, file.Close())
|
|
assert.NoError(t, os.RemoveAll(file.Name()))
|
|
}()
|
|
err = json.NewEncoder(file).Encode(&spec)
|
|
require.NoError(t, err)
|
|
config := criconfig.Config{}
|
|
config.Runtimes = map[string]criconfig.Runtime{
|
|
"runc": {BaseRuntimeSpec: file.Name()},
|
|
}
|
|
var buffer bytes.Buffer
|
|
logger := &logrus.Logger{
|
|
Out: &buffer,
|
|
Formatter: new(logrus.TextFormatter),
|
|
Hooks: make(logrus.LevelHooks),
|
|
Level: logrus.InfoLevel,
|
|
ExitFunc: os.Exit,
|
|
ReportCaller: false,
|
|
}
|
|
log.L = logrus.NewEntry(logger)
|
|
tests := []struct {
|
|
name string
|
|
args *criconfig.Config
|
|
message string
|
|
}{
|
|
{
|
|
name: "args is not nil,print warning",
|
|
args: &config,
|
|
message: "Provided base runtime spec includes inheritable capabilities, which may be unsafe. See CVE-2022-24769 for more details.",
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
loadBaseOCISpecs(tt.args)
|
|
readAll, _ := io.ReadAll(&buffer)
|
|
if tt.message != "" {
|
|
assert.Contains(t, string(readAll), tt.message)
|
|
}
|
|
})
|
|
}
|
|
}
|