 9ad087947d
			
		
	
	9ad087947d
	
	
	
		
			
			Also warn when someone uses version 1 Signed-off-by: Davanum Srinivas <davanum@gmail.com>
		
			
				
	
	
		
			269 lines
		
	
	
		
			6.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			269 lines
		
	
	
		
			6.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
|    Copyright The containerd Authors.
 | |
| 
 | |
|    Licensed under the Apache License, Version 2.0 (the "License");
 | |
|    you may not use this file except in compliance with the License.
 | |
|    You may obtain a copy of the License at
 | |
| 
 | |
|        http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
|    Unless required by applicable law or agreed to in writing, software
 | |
|    distributed under the License is distributed on an "AS IS" BASIS,
 | |
|    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|    See the License for the specific language governing permissions and
 | |
|    limitations under the License.
 | |
| */
 | |
| 
 | |
| package client
 | |
| 
 | |
| import (
 | |
| 	"bufio"
 | |
| 	"bytes"
 | |
| 	"context"
 | |
| 	"fmt"
 | |
| 	"io/ioutil"
 | |
| 	"os"
 | |
| 	"os/exec"
 | |
| 	"path/filepath"
 | |
| 	"strings"
 | |
| 	"syscall"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/containerd/cgroups"
 | |
| 	. "github.com/containerd/containerd"
 | |
| 	"github.com/containerd/containerd/oci"
 | |
| 	"github.com/containerd/containerd/pkg/testutil"
 | |
| 	"github.com/containerd/containerd/plugin"
 | |
| 	"github.com/containerd/containerd/runtime/v2/runc/options"
 | |
| 	srvconfig "github.com/containerd/containerd/services/server/config"
 | |
| )
 | |
| 
 | |
| // the following nolint is for shutting up gometalinter on non-linux.
 | |
| // nolint: unused
 | |
| func newDaemonWithConfig(t *testing.T, configTOML string) (*Client, *daemon, func()) {
 | |
| 	if testing.Short() {
 | |
| 		t.Skip()
 | |
| 	}
 | |
| 	testutil.RequiresRoot(t)
 | |
| 	var (
 | |
| 		ctrd              = daemon{}
 | |
| 		configTOMLDecoded srvconfig.Config
 | |
| 		buf               = bytes.NewBuffer(nil)
 | |
| 	)
 | |
| 
 | |
| 	tempDir, err := ioutil.TempDir("", "containerd-test-new-daemon-with-config")
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	defer func() {
 | |
| 		if err != nil {
 | |
| 			os.RemoveAll(tempDir)
 | |
| 		}
 | |
| 	}()
 | |
| 
 | |
| 	configTOMLFile := filepath.Join(tempDir, "config.toml")
 | |
| 	if err = ioutil.WriteFile(configTOMLFile, []byte(configTOML), 0600); err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	if err = srvconfig.LoadConfig(configTOMLFile, &configTOMLDecoded); err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	address := configTOMLDecoded.GRPC.Address
 | |
| 	if address == "" {
 | |
| 		address = filepath.Join(tempDir, "containerd.sock")
 | |
| 	}
 | |
| 	args := []string{"-c", configTOMLFile}
 | |
| 	if configTOMLDecoded.Root == "" {
 | |
| 		args = append(args, "--root", filepath.Join(tempDir, "root"))
 | |
| 	}
 | |
| 	if configTOMLDecoded.State == "" {
 | |
| 		args = append(args, "--state", filepath.Join(tempDir, "state"))
 | |
| 	}
 | |
| 	if err = ctrd.start("containerd", address, args, buf, buf); err != nil {
 | |
| 		t.Fatalf("%v: %s", err, buf.String())
 | |
| 	}
 | |
| 
 | |
| 	waitCtx, waitCancel := context.WithTimeout(context.TODO(), 2*time.Second)
 | |
| 	client, err := ctrd.waitForStart(waitCtx)
 | |
| 	waitCancel()
 | |
| 	if err != nil {
 | |
| 		ctrd.Kill()
 | |
| 		ctrd.Wait()
 | |
| 		t.Fatalf("%v: %s", err, buf.String())
 | |
| 	}
 | |
| 
 | |
| 	cleanup := func() {
 | |
| 		if err := client.Close(); err != nil {
 | |
| 			t.Fatalf("failed to close client: %v", err)
 | |
| 		}
 | |
| 		if err := ctrd.Stop(); err != nil {
 | |
| 			if err := ctrd.Kill(); err != nil {
 | |
| 				t.Fatalf("failed to signal containerd: %v", err)
 | |
| 			}
 | |
| 		}
 | |
| 		if err := ctrd.Wait(); err != nil {
 | |
| 			if _, ok := err.(*exec.ExitError); !ok {
 | |
| 				t.Fatalf("failed to wait for: %v", err)
 | |
| 			}
 | |
| 		}
 | |
| 		if err := os.RemoveAll(tempDir); err != nil {
 | |
| 			t.Fatalf("failed to remove %s: %v", tempDir, err)
 | |
| 		}
 | |
| 		// cleaning config-specific resources is up to the caller
 | |
| 	}
 | |
| 	return client, &ctrd, cleanup
 | |
| }
 | |
| 
 | |
| // TestDaemonRuntimeRoot ensures plugin.linux.runtime_root is not ignored
 | |
| func TestDaemonRuntimeRoot(t *testing.T) {
 | |
| 	runtimeRoot, err := ioutil.TempDir("", "containerd-test-runtime-root")
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	defer func() {
 | |
| 		if err != nil {
 | |
| 			os.RemoveAll(runtimeRoot)
 | |
| 		}
 | |
| 	}()
 | |
| 	configTOML := `
 | |
| version = 2
 | |
| [plugins]
 | |
|  [plugins."io.containerd.grpc.v1.cri"]
 | |
|    stream_server_port = "0"
 | |
| `
 | |
| 
 | |
| 	client, _, cleanup := newDaemonWithConfig(t, configTOML)
 | |
| 	defer cleanup()
 | |
| 
 | |
| 	ctx, cancel := testContext(t)
 | |
| 	defer cancel()
 | |
| 	// FIXME(AkihiroSuda): import locally frozen image?
 | |
| 	image, err := client.Pull(ctx, testImage, WithPullUnpack)
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	id := t.Name()
 | |
| 	container, err := client.NewContainer(ctx, id, WithNewSnapshot(id, image), WithNewSpec(oci.WithImageConfig(image), withProcessArgs("top")), WithRuntime(plugin.RuntimeRuncV1, &options.Options{
 | |
| 		Root: runtimeRoot,
 | |
| 	}))
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	defer container.Delete(ctx, WithSnapshotCleanup)
 | |
| 
 | |
| 	task, err := container.NewTask(ctx, empty())
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	defer task.Delete(ctx)
 | |
| 
 | |
| 	status, err := task.Wait(ctx)
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	containerPath := filepath.Join(runtimeRoot, testNamespace, id)
 | |
| 	if _, err = os.Stat(containerPath); err != nil {
 | |
| 		t.Errorf("error while getting stat for %s: %v", containerPath, err)
 | |
| 	}
 | |
| 
 | |
| 	if err = task.Kill(ctx, syscall.SIGKILL); err != nil {
 | |
| 		t.Error(err)
 | |
| 	}
 | |
| 	<-status
 | |
| }
 | |
| 
 | |
| // code most copy from https://github.com/opencontainers/runc
 | |
| func getCgroupPath() (map[string]string, error) {
 | |
| 	cgroupPath := make(map[string]string)
 | |
| 	f, err := os.Open("/proc/self/mountinfo")
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	defer f.Close()
 | |
| 
 | |
| 	scanner := bufio.NewScanner(f)
 | |
| 	for scanner.Scan() {
 | |
| 		text := scanner.Text()
 | |
| 		fields := strings.Split(text, " ")
 | |
| 		// Safe as mountinfo encodes mountpoints with spaces as \040.
 | |
| 		index := strings.Index(text, " - ")
 | |
| 		postSeparatorFields := strings.Fields(text[index+3:])
 | |
| 		numPostFields := len(postSeparatorFields)
 | |
| 
 | |
| 		// This is an error as we can't detect if the mount is for "cgroup"
 | |
| 		if numPostFields == 0 {
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		if postSeparatorFields[0] == "cgroup" {
 | |
| 			// Check that the mount is properly formatted.
 | |
| 			if numPostFields < 3 {
 | |
| 				continue
 | |
| 			}
 | |
| 			cgroupPath[filepath.Base(fields[4])] = fields[4]
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return cgroupPath, nil
 | |
| }
 | |
| 
 | |
| // TestDaemonCustomCgroup ensures plugin.cgroup.path is not ignored
 | |
| func TestDaemonCustomCgroup(t *testing.T) {
 | |
| 	if cgroups.Mode() == cgroups.Unified {
 | |
| 		t.Skip("test requires cgroup1")
 | |
| 	}
 | |
| 	cgroupPath, err := getCgroupPath()
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	if len(cgroupPath) == 0 {
 | |
| 		t.Skip("skip TestDaemonCustomCgroup since no cgroup path available")
 | |
| 	}
 | |
| 
 | |
| 	customCgroup := fmt.Sprintf("%d", time.Now().Nanosecond())
 | |
| 	configTOML := `
 | |
| version = 2
 | |
| [cgroup]
 | |
|   path = "` + customCgroup + `"`
 | |
| 
 | |
| 	_, _, cleanup := newDaemonWithConfig(t, configTOML)
 | |
| 
 | |
| 	defer func() {
 | |
| 		// do cgroup path clean
 | |
| 		for _, v := range cgroupPath {
 | |
| 			if _, err := os.Stat(filepath.Join(v, customCgroup)); err == nil {
 | |
| 				if err := os.RemoveAll(filepath.Join(v, customCgroup)); err != nil {
 | |
| 					t.Logf("failed to remove cgroup path %s", filepath.Join(v, customCgroup))
 | |
| 				}
 | |
| 			}
 | |
| 		}
 | |
| 	}()
 | |
| 
 | |
| 	defer cleanup()
 | |
| 
 | |
| 	paths := []string{
 | |
| 		"devices",
 | |
| 		"memory",
 | |
| 		"cpu",
 | |
| 		"blkio",
 | |
| 	}
 | |
| 
 | |
| 	for _, p := range paths {
 | |
| 		v := cgroupPath[p]
 | |
| 		if v == "" {
 | |
| 			continue
 | |
| 		}
 | |
| 		path := filepath.Join(v, customCgroup)
 | |
| 		if _, err := os.Stat(path); err != nil {
 | |
| 			if os.IsNotExist(err) {
 | |
| 				t.Fatalf("custom cgroup path %s should exist, actually not", path)
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| }
 |