417 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			417 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| //go:build linux
 | |
| // +build linux
 | |
| 
 | |
| /*
 | |
|    Copyright The containerd Authors.
 | |
| 
 | |
|    Licensed under the Apache License, Version 2.0 (the "License");
 | |
|    you may not use this file except in compliance with the License.
 | |
|    You may obtain a copy of the License at
 | |
| 
 | |
|        http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
|    Unless required by applicable law or agreed to in writing, software
 | |
|    distributed under the License is distributed on an "AS IS" BASIS,
 | |
|    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|    See the License for the specific language governing permissions and
 | |
|    limitations under the License.
 | |
| */
 | |
| 
 | |
| package integration
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"encoding/json"
 | |
| 	"fmt"
 | |
| 	"os"
 | |
| 	"path/filepath"
 | |
| 	"runtime"
 | |
| 	"strings"
 | |
| 	"sync"
 | |
| 	"syscall"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	runtimespec "github.com/opencontainers/runtime-spec/specs-go"
 | |
| 	"github.com/stretchr/testify/assert"
 | |
| 	"github.com/stretchr/testify/require"
 | |
| 	criapiv1 "k8s.io/cri-api/pkg/apis/runtime/v1"
 | |
| 
 | |
| 	"github.com/containerd/containerd/pkg/cri/sbserver/podsandbox"
 | |
| 	"github.com/containerd/containerd/pkg/cri/store/sandbox"
 | |
| 	"github.com/containerd/containerd/pkg/failpoint"
 | |
| 	"github.com/containerd/typeurl"
 | |
| )
 | |
| 
 | |
| const (
 | |
| 	failpointRuntimeHandler = "runc-fp"
 | |
| 	failpointCNIBinary      = "cni-bridge-fp"
 | |
| 
 | |
| 	failpointShimPrefixKey = "io.containerd.runtime.v2.shim.failpoint."
 | |
| 
 | |
| 	failpointCNIConfPathKey = "failpoint.cni.containerd.io/confpath"
 | |
| )
 | |
| 
 | |
| func TestRunPodSandboxWithSetupCNIFailure(t *testing.T) {
 | |
| 	if runtime.GOOS != "linux" {
 | |
| 		t.Skip()
 | |
| 	}
 | |
| 
 | |
| 	t.Logf("Inject CNI failpoint")
 | |
| 	conf := &failpointConf{
 | |
| 		Add: "1*error(you-shall-not-pass!)",
 | |
| 	}
 | |
| 
 | |
| 	sbConfig := PodSandboxConfig(t.Name(), "failpoint")
 | |
| 	injectCNIFailpoint(t, sbConfig, conf)
 | |
| 
 | |
| 	t.Logf("Create a sandbox")
 | |
| 	_, err := runtimeService.RunPodSandbox(sbConfig, failpointRuntimeHandler)
 | |
| 	require.Error(t, err)
 | |
| 	require.Equal(t, true, strings.Contains(err.Error(), "you-shall-not-pass!"))
 | |
| 
 | |
| 	t.Logf("Retry to create sandbox with same config")
 | |
| 	sb, err := runtimeService.RunPodSandbox(sbConfig, failpointRuntimeHandler)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	err = runtimeService.StopPodSandbox(sb)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	err = runtimeService.RemovePodSandbox(sb)
 | |
| 	require.NoError(t, err)
 | |
| }
 | |
| 
 | |
| func TestRunPodSandboxWithShimStartFailure(t *testing.T) {
 | |
| 	if runtime.GOOS != "linux" {
 | |
| 		t.Skip()
 | |
| 	}
 | |
| 
 | |
| 	t.Logf("Inject Shim failpoint")
 | |
| 
 | |
| 	sbConfig := PodSandboxConfig(t.Name(), "failpoint")
 | |
| 	injectShimFailpoint(t, sbConfig, map[string]string{
 | |
| 		"Start": "1*error(no hard feelings)",
 | |
| 	})
 | |
| 
 | |
| 	t.Logf("Create a sandbox")
 | |
| 	_, err := runtimeService.RunPodSandbox(sbConfig, failpointRuntimeHandler)
 | |
| 	require.Error(t, err)
 | |
| 	require.Equal(t, true, strings.Contains(err.Error(), "no hard feelings"))
 | |
| }
 | |
| 
 | |
| // TestRunPodSandboxWithShimDeleteFailure should keep the sandbox record if
 | |
| // failed to rollback shim by shim.Delete API.
 | |
| func TestRunPodSandboxWithShimDeleteFailure(t *testing.T) {
 | |
| 	if runtime.GOOS != "linux" {
 | |
| 		t.Skip()
 | |
| 	}
 | |
| 
 | |
| 	testCase := func(restart bool) func(*testing.T) {
 | |
| 		return func(t *testing.T) {
 | |
| 			t.Log("Init PodSandboxConfig with specific label")
 | |
| 			labels := map[string]string{
 | |
| 				t.Name(): "true",
 | |
| 			}
 | |
| 			sbConfig := PodSandboxConfig(t.Name(), "failpoint", WithPodLabels(labels))
 | |
| 
 | |
| 			t.Log("Inject Shim failpoint")
 | |
| 			injectShimFailpoint(t, sbConfig, map[string]string{
 | |
| 				"Start":  "1*error(failed to start shim)",
 | |
| 				"Delete": "1*error(please retry)", // inject failpoint during rollback shim
 | |
| 			})
 | |
| 
 | |
| 			t.Log("Create a sandbox")
 | |
| 			_, err := runtimeService.RunPodSandbox(sbConfig, failpointRuntimeHandler)
 | |
| 			require.Error(t, err)
 | |
| 			require.ErrorContains(t, err, "failed to start shim")
 | |
| 
 | |
| 			t.Log("ListPodSandbox with the specific label")
 | |
| 			l, err := runtimeService.ListPodSandbox(&criapiv1.PodSandboxFilter{LabelSelector: labels})
 | |
| 			require.NoError(t, err)
 | |
| 			require.Len(t, l, 1)
 | |
| 
 | |
| 			sb := l[0]
 | |
| 			require.Equal(t, sb.State, criapiv1.PodSandboxState_SANDBOX_NOTREADY)
 | |
| 			require.Equal(t, sb.Metadata.Name, sbConfig.Metadata.Name)
 | |
| 			require.Equal(t, sb.Metadata.Namespace, sbConfig.Metadata.Namespace)
 | |
| 			require.Equal(t, sb.Metadata.Uid, sbConfig.Metadata.Uid)
 | |
| 			require.Equal(t, sb.Metadata.Attempt, sbConfig.Metadata.Attempt)
 | |
| 
 | |
| 			t.Log("Check PodSandboxStatus")
 | |
| 			sbStatus, err := runtimeService.PodSandboxStatus(sb.Id)
 | |
| 			require.NoError(t, err)
 | |
| 			require.Equal(t, sbStatus.State, criapiv1.PodSandboxState_SANDBOX_NOTREADY)
 | |
| 			require.Greater(t, len(sbStatus.Network.Ip), 0)
 | |
| 
 | |
| 			if restart {
 | |
| 				t.Log("Restart containerd")
 | |
| 				RestartContainerd(t, syscall.SIGTERM)
 | |
| 
 | |
| 				t.Log("ListPodSandbox with the specific label")
 | |
| 				l, err = runtimeService.ListPodSandbox(&criapiv1.PodSandboxFilter{Id: sb.Id})
 | |
| 				require.NoError(t, err)
 | |
| 				require.Len(t, l, 1)
 | |
| 				require.Equal(t, l[0].State, criapiv1.PodSandboxState_SANDBOX_NOTREADY)
 | |
| 
 | |
| 				t.Log("Check PodSandboxStatus")
 | |
| 				sbStatus, err := runtimeService.PodSandboxStatus(sb.Id)
 | |
| 				require.NoError(t, err)
 | |
| 				t.Log(sbStatus.Network)
 | |
| 				require.Equal(t, sbStatus.State, criapiv1.PodSandboxState_SANDBOX_NOTREADY)
 | |
| 			}
 | |
| 
 | |
| 			t.Log("Cleanup leaky sandbox")
 | |
| 			err = runtimeService.RemovePodSandbox(sb.Id)
 | |
| 			require.NoError(t, err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	t.Run("CleanupAfterRestart", testCase(true))
 | |
| 	t.Run("JustCleanup", testCase(false))
 | |
| }
 | |
| 
 | |
| // TestRunPodSandboxWithShimStartAndTeardownCNIFailure should keep the sandbox
 | |
| // record if failed to rollback CNI API.
 | |
| func TestRunPodSandboxWithShimStartAndTeardownCNIFailure(t *testing.T) {
 | |
| 	if runtime.GOOS != "linux" {
 | |
| 		t.Skip()
 | |
| 	}
 | |
| 
 | |
| 	testCase := func(restart bool) func(*testing.T) {
 | |
| 		return func(t *testing.T) {
 | |
| 			t.Log("Init PodSandboxConfig with specific key")
 | |
| 			labels := map[string]string{
 | |
| 				t.Name(): "true",
 | |
| 			}
 | |
| 			sbConfig := PodSandboxConfig(t.Name(), "failpoint", WithPodLabels(labels))
 | |
| 
 | |
| 			t.Log("Inject Shim failpoint")
 | |
| 			injectShimFailpoint(t, sbConfig, map[string]string{
 | |
| 				"Start": "1*error(failed to start shim)",
 | |
| 			})
 | |
| 
 | |
| 			t.Log("Inject CNI failpoint")
 | |
| 			conf := &failpointConf{
 | |
| 				Del: "1*error(please retry)",
 | |
| 			}
 | |
| 			injectCNIFailpoint(t, sbConfig, conf)
 | |
| 
 | |
| 			t.Log("Create a sandbox")
 | |
| 			_, err := runtimeService.RunPodSandbox(sbConfig, failpointRuntimeHandler)
 | |
| 			require.Error(t, err)
 | |
| 			require.ErrorContains(t, err, "failed to start shim")
 | |
| 
 | |
| 			t.Log("ListPodSandbox with the specific label")
 | |
| 			l, err := runtimeService.ListPodSandbox(&criapiv1.PodSandboxFilter{LabelSelector: labels})
 | |
| 			require.NoError(t, err)
 | |
| 			require.Len(t, l, 1)
 | |
| 
 | |
| 			sb := l[0]
 | |
| 			require.Equal(t, sb.State, criapiv1.PodSandboxState_SANDBOX_NOTREADY)
 | |
| 			require.Equal(t, sb.Metadata.Name, sbConfig.Metadata.Name)
 | |
| 			require.Equal(t, sb.Metadata.Namespace, sbConfig.Metadata.Namespace)
 | |
| 			require.Equal(t, sb.Metadata.Uid, sbConfig.Metadata.Uid)
 | |
| 			require.Equal(t, sb.Metadata.Attempt, sbConfig.Metadata.Attempt)
 | |
| 
 | |
| 			if restart {
 | |
| 				t.Log("Restart containerd")
 | |
| 				RestartContainerd(t, syscall.SIGTERM)
 | |
| 
 | |
| 				t.Log("ListPodSandbox with the specific label")
 | |
| 				l, err = runtimeService.ListPodSandbox(&criapiv1.PodSandboxFilter{Id: sb.Id})
 | |
| 				require.NoError(t, err)
 | |
| 				require.Len(t, l, 1)
 | |
| 				require.Equal(t, l[0].State, criapiv1.PodSandboxState_SANDBOX_NOTREADY)
 | |
| 			}
 | |
| 
 | |
| 			t.Log("Cleanup leaky sandbox")
 | |
| 			err = runtimeService.RemovePodSandbox(sb.Id)
 | |
| 			require.NoError(t, err)
 | |
| 		}
 | |
| 	}
 | |
| 	t.Run("CleanupAfterRestart", testCase(true))
 | |
| 	t.Run("JustCleanup", testCase(false))
 | |
| }
 | |
| 
 | |
| // TestRunPodSandboxWithShimStartAndTeardownCNISlow should keep the sandbox
 | |
| // record if failed to rollback CNI API.
 | |
| func TestRunPodSandboxAndTeardownCNISlow(t *testing.T) {
 | |
| 	if runtime.GOOS != "linux" {
 | |
| 		t.Skip()
 | |
| 	}
 | |
| 
 | |
| 	t.Log("Init PodSandboxConfig with specific key")
 | |
| 	sbName := t.Name()
 | |
| 	labels := map[string]string{
 | |
| 		sbName: "true",
 | |
| 	}
 | |
| 	sbConfig := PodSandboxConfig(sbName, "failpoint", WithPodLabels(labels))
 | |
| 
 | |
| 	t.Log("Inject CNI failpoint")
 | |
| 	conf := &failpointConf{
 | |
| 		// Delay 1 day
 | |
| 		Add: "1*delay(86400000)",
 | |
| 	}
 | |
| 	injectCNIFailpoint(t, sbConfig, conf)
 | |
| 
 | |
| 	var wg sync.WaitGroup
 | |
| 	wg.Add(1)
 | |
| 
 | |
| 	go func() {
 | |
| 		defer wg.Done()
 | |
| 		t.Log("Create a sandbox")
 | |
| 		_, err := runtimeService.RunPodSandbox(sbConfig, failpointRuntimeHandler)
 | |
| 		require.Error(t, err)
 | |
| 		require.ErrorContains(t, err, "error reading from server: EOF")
 | |
| 	}()
 | |
| 
 | |
| 	assert.NoError(t, ensureCNIAddRunning(t, sbName), "check that failpoint CNI.Add is running")
 | |
| 
 | |
| 	// Use SIGKILL to prevent containerd server gracefulshutdown which may cause indeterministic invocation of defer functions
 | |
| 	t.Log("Restart containerd")
 | |
| 	RestartContainerd(t, syscall.SIGKILL)
 | |
| 
 | |
| 	wg.Wait()
 | |
| 
 | |
| 	t.Log("ListPodSandbox with the specific label")
 | |
| 	l, err := runtimeService.ListPodSandbox(&criapiv1.PodSandboxFilter{LabelSelector: labels})
 | |
| 	require.NoError(t, err)
 | |
| 	require.Len(t, l, 1)
 | |
| 
 | |
| 	sb := l[0]
 | |
| 
 | |
| 	defer func() {
 | |
| 		t.Log("Cleanup leaky sandbox")
 | |
| 		err := runtimeService.StopPodSandbox(sb.Id)
 | |
| 		assert.NoError(t, err)
 | |
| 		err = runtimeService.RemovePodSandbox(sb.Id)
 | |
| 		require.NoError(t, err)
 | |
| 	}()
 | |
| 
 | |
| 	assert.Equal(t, sb.State, criapiv1.PodSandboxState_SANDBOX_NOTREADY)
 | |
| 	assert.Equal(t, sb.Metadata.Name, sbConfig.Metadata.Name)
 | |
| 	assert.Equal(t, sb.Metadata.Namespace, sbConfig.Metadata.Namespace)
 | |
| 	assert.Equal(t, sb.Metadata.Uid, sbConfig.Metadata.Uid)
 | |
| 	assert.Equal(t, sb.Metadata.Attempt, sbConfig.Metadata.Attempt)
 | |
| 
 | |
| 	switch os.Getenv("ENABLE_CRI_SANDBOXES") {
 | |
| 	case "":
 | |
| 		// non-sbserver
 | |
| 		t.Log("Get sandbox info (non-sbserver)")
 | |
| 		_, info, err := SandboxInfo(sb.Id)
 | |
| 		require.NoError(t, err)
 | |
| 		require.False(t, info.NetNSClosed)
 | |
| 		var netNS string
 | |
| 		for _, n := range info.RuntimeSpec.Linux.Namespaces {
 | |
| 			if n.Type == runtimespec.NetworkNamespace {
 | |
| 				netNS = n.Path
 | |
| 			}
 | |
| 		}
 | |
| 		assert.NotEmpty(t, netNS, "network namespace should be set")
 | |
| 
 | |
| 		t.Log("Get sandbox container")
 | |
| 		c, err := GetContainer(sb.Id)
 | |
| 		require.NoError(t, err)
 | |
| 		any, ok := c.Extensions["io.cri-containerd.sandbox.metadata"]
 | |
| 		require.True(t, ok, "sandbox metadata should exist in extension")
 | |
| 		i, err := typeurl.UnmarshalAny(any)
 | |
| 		require.NoError(t, err)
 | |
| 		require.IsType(t, &sandbox.Metadata{}, i)
 | |
| 		metadata, ok := i.(*sandbox.Metadata)
 | |
| 		require.True(t, ok)
 | |
| 		assert.Equal(t, netNS, metadata.NetNSPath, "network namespace path should be the same in runtime spec and sandbox metadata")
 | |
| 	default:
 | |
| 		// sbserver
 | |
| 		t.Log("Get sandbox info (sbserver)")
 | |
| 		_, info, err := sbserverSandboxInfo(sb.Id)
 | |
| 		require.NoError(t, err)
 | |
| 		require.False(t, info.NetNSClosed)
 | |
| 
 | |
| 		assert.NotEmpty(t, info.Metadata.NetNSPath, "network namespace should be set")
 | |
| 	}
 | |
| 
 | |
| }
 | |
| 
 | |
| // sbserverSandboxInfo gets sandbox info.
 | |
| func sbserverSandboxInfo(id string) (*criapiv1.PodSandboxStatus, *podsandbox.SandboxInfo, error) {
 | |
| 	client, err := RawRuntimeClient()
 | |
| 	if err != nil {
 | |
| 		return nil, nil, fmt.Errorf("failed to get raw runtime client: %w", err)
 | |
| 	}
 | |
| 	resp, err := client.PodSandboxStatus(context.Background(), &criapiv1.PodSandboxStatusRequest{
 | |
| 		PodSandboxId: id,
 | |
| 		Verbose:      true,
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		return nil, nil, fmt.Errorf("failed to get sandbox status: %w", err)
 | |
| 	}
 | |
| 	status := resp.GetStatus()
 | |
| 	var info podsandbox.SandboxInfo
 | |
| 	if err := json.Unmarshal([]byte(resp.GetInfo()["info"]), &info); err != nil {
 | |
| 		return nil, nil, fmt.Errorf("failed to unmarshal sandbox info: %w", err)
 | |
| 	}
 | |
| 	return status, &info, nil
 | |
| }
 | |
| 
 | |
| func ensureCNIAddRunning(t *testing.T, sbName string) error {
 | |
| 	return Eventually(func() (bool, error) {
 | |
| 		pids, err := PidsOf(failpointCNIBinary)
 | |
| 		if err != nil || len(pids) == 0 {
 | |
| 			return false, err
 | |
| 		}
 | |
| 
 | |
| 		for _, pid := range pids {
 | |
| 			envs, err := PidEnvs(pid)
 | |
| 			if err != nil {
 | |
| 				t.Logf("failed to read environ of pid %v: %v: skip it", pid, err)
 | |
| 				continue
 | |
| 			}
 | |
| 
 | |
| 			args, ok := envs["CNI_ARGS"]
 | |
| 			if !ok {
 | |
| 				t.Logf("expected CNI_ARGS env but got nothing, skip pid=%v", pid)
 | |
| 				continue
 | |
| 			}
 | |
| 
 | |
| 			for _, arg := range strings.Split(args, ";") {
 | |
| 				if arg == "K8S_POD_NAME="+sbName {
 | |
| 					return true, nil
 | |
| 				}
 | |
| 			}
 | |
| 		}
 | |
| 		return false, nil
 | |
| 	}, time.Second, 30*time.Second)
 | |
| }
 | |
| 
 | |
| // failpointConf is used to describe cmdAdd/cmdDel/cmdCheck command's failpoint.
 | |
| type failpointConf struct {
 | |
| 	Add   string `json:"cmdAdd"`
 | |
| 	Del   string `json:"cmdDel"`
 | |
| 	Check string `json:"cmdCheck"`
 | |
| }
 | |
| 
 | |
| func injectCNIFailpoint(t *testing.T, sbConfig *criapiv1.PodSandboxConfig, conf *failpointConf) {
 | |
| 	stateDir := t.TempDir()
 | |
| 
 | |
| 	metadata := sbConfig.Metadata
 | |
| 	fpFilename := filepath.Join(stateDir,
 | |
| 		fmt.Sprintf("%s-%s.json", metadata.Namespace, strings.Replace(metadata.Name, "/", "-", -1)))
 | |
| 
 | |
| 	data, err := json.Marshal(conf)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	err = os.WriteFile(fpFilename, data, 0666)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	sbConfig.Annotations[failpointCNIConfPathKey] = fpFilename
 | |
| }
 | |
| 
 | |
| func injectShimFailpoint(t *testing.T, sbConfig *criapiv1.PodSandboxConfig, methodFps map[string]string) {
 | |
| 	for method, fp := range methodFps {
 | |
| 		_, err := failpoint.NewFailpoint(method, fp)
 | |
| 		require.NoError(t, err, "check failpoint %s for shim method %s", fp, method)
 | |
| 
 | |
| 		sbConfig.Annotations[failpointShimPrefixKey+method] = fp
 | |
| 	}
 | |
| }
 | 
