 99721c27e1
			
		
	
	99721c27e1
	
	
	
		
			
			Schema 1 (`application/vnd.docker.distribution.manifest.v1+prettyjws`) has been officially deprecated since containerd v1.7 (PR 6884). We have planned to remove the support for Schema 1 in containerd v2.0, but this removal may still surprise some users. So, in containerd v2.0 we will just disable it by default. The support for Schema 1 can be still enabled by setting an environment variable `CONTAINERD_ENABLE_DEPRECATED_PULL_SCHEMA_1_IMAGE=1`, however, this workaround will be completely removed in containerd v2.1. Schema 2 was introduced in Docker 1.10 (Feb 2016), so most users should have been already using Schema 2 or OCI. Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
		
			
				
	
	
		
			308 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			308 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
|    Copyright The containerd Authors.
 | |
| 
 | |
|    Licensed under the Apache License, Version 2.0 (the "License");
 | |
|    you may not use this file except in compliance with the License.
 | |
|    You may obtain a copy of the License at
 | |
| 
 | |
|        http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
|    Unless required by applicable law or agreed to in writing, software
 | |
|    distributed under the License is distributed on an "AS IS" BASIS,
 | |
|    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|    See the License for the specific language governing permissions and
 | |
|    limitations under the License.
 | |
| */
 | |
| 
 | |
| package integration
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	goruntime "runtime"
 | |
| 	"strings"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	containerd "github.com/containerd/containerd/v2/client"
 | |
| 	"github.com/containerd/containerd/v2/integration/images"
 | |
| 	"github.com/containerd/containerd/v2/internal/cri/labels"
 | |
| 	"github.com/containerd/containerd/v2/pkg/deprecation"
 | |
| 	"github.com/containerd/containerd/v2/pkg/namespaces"
 | |
| 	"github.com/containerd/errdefs"
 | |
| 	"github.com/stretchr/testify/assert"
 | |
| 	"github.com/stretchr/testify/require"
 | |
| 	runtime "k8s.io/cri-api/pkg/apis/runtime/v1"
 | |
| )
 | |
| 
 | |
| // Test to test the CRI plugin should see image pulled into containerd directly.
 | |
| func TestContainerdImage(t *testing.T) {
 | |
| 	var testImage = images.Get(images.BusyBox)
 | |
| 	ctx := context.Background()
 | |
| 
 | |
| 	t.Logf("make sure the test image doesn't exist in the cri plugin")
 | |
| 	i, err := imageService.ImageStatus(&runtime.ImageSpec{Image: testImage})
 | |
| 	require.NoError(t, err)
 | |
| 	if i != nil {
 | |
| 		require.NoError(t, imageService.RemoveImage(&runtime.ImageSpec{Image: testImage}))
 | |
| 	}
 | |
| 
 | |
| 	t.Logf("pull the image into containerd")
 | |
| 	lbs := map[string]string{"foo": "bar", labels.PinnedImageLabelKey: labels.PinnedImageLabelValue}
 | |
| 	_, err = containerdClient.Pull(ctx, testImage, containerd.WithPullUnpack, containerd.WithPullLabels(lbs))
 | |
| 	assert.NoError(t, err)
 | |
| 	defer func() {
 | |
| 		// Make sure the image is cleaned up in any case.
 | |
| 		if err := containerdClient.ImageService().Delete(ctx, testImage); err != nil {
 | |
| 			assert.True(t, errdefs.IsNotFound(err), err)
 | |
| 		}
 | |
| 		assert.NoError(t, imageService.RemoveImage(&runtime.ImageSpec{Image: testImage}))
 | |
| 	}()
 | |
| 
 | |
| 	t.Logf("the image should be seen by the cri plugin")
 | |
| 	var id string
 | |
| 	checkImage := func() (bool, error) {
 | |
| 		img, err := imageService.ImageStatus(&runtime.ImageSpec{Image: testImage})
 | |
| 		if err != nil {
 | |
| 			return false, err
 | |
| 		}
 | |
| 		if img == nil {
 | |
| 			t.Logf("Image %q not show up in the cri plugin yet", testImage)
 | |
| 			return false, nil
 | |
| 		}
 | |
| 		id = img.Id
 | |
| 		img, err = imageService.ImageStatus(&runtime.ImageSpec{Image: id})
 | |
| 		if err != nil {
 | |
| 			return false, err
 | |
| 		}
 | |
| 		if img == nil {
 | |
| 			// We always generate image id as a reference first, it must
 | |
| 			// be ready here.
 | |
| 			return false, errors.New("can't reference image by id")
 | |
| 		}
 | |
| 		if len(img.RepoTags) != 1 {
 | |
| 			// RepoTags must have been populated correctly.
 | |
| 			return false, fmt.Errorf("unexpected repotags: %+v", img.RepoTags)
 | |
| 		}
 | |
| 		if img.RepoTags[0] != testImage {
 | |
| 			return false, fmt.Errorf("unexpected repotag %q", img.RepoTags[0])
 | |
| 		}
 | |
| 		return true, nil
 | |
| 	}
 | |
| 	require.NoError(t, Eventually(checkImage, 100*time.Millisecond, 10*time.Second))
 | |
| 	require.NoError(t, Consistently(checkImage, 100*time.Millisecond, time.Second))
 | |
| 	defer func() {
 | |
| 		t.Logf("image should still be seen by id if only tag get deleted")
 | |
| 		if err := containerdClient.ImageService().Delete(ctx, testImage); err != nil {
 | |
| 			assert.True(t, errdefs.IsNotFound(err), err)
 | |
| 		}
 | |
| 		assert.NoError(t, Consistently(func() (bool, error) {
 | |
| 			img, err := imageService.ImageStatus(&runtime.ImageSpec{Image: id})
 | |
| 			if err != nil {
 | |
| 				return false, err
 | |
| 			}
 | |
| 			return img != nil, nil
 | |
| 		}, 100*time.Millisecond, time.Second))
 | |
| 		t.Logf("image should be removed from the cri plugin if all references get deleted")
 | |
| 		if err := containerdClient.ImageService().Delete(ctx, id); err != nil {
 | |
| 			assert.True(t, errdefs.IsNotFound(err), err)
 | |
| 		}
 | |
| 		assert.NoError(t, Eventually(func() (bool, error) {
 | |
| 			img, err := imageService.ImageStatus(&runtime.ImageSpec{Image: id})
 | |
| 			if err != nil {
 | |
| 				return false, err
 | |
| 			}
 | |
| 			return img == nil, nil
 | |
| 		}, 100*time.Millisecond, 10*time.Second))
 | |
| 	}()
 | |
| 
 | |
| 	t.Logf("the image should be marked as managed")
 | |
| 	imgByRef, err := containerdClient.GetImage(ctx, testImage)
 | |
| 	assert.NoError(t, err)
 | |
| 	assert.Equal(t, "managed", imgByRef.Labels()["io.cri-containerd.image"])
 | |
| 
 | |
| 	t.Logf("the image id should be created and managed")
 | |
| 	imgByID, err := containerdClient.GetImage(ctx, id)
 | |
| 	assert.NoError(t, err)
 | |
| 	assert.Equal(t, "managed", imgByID.Labels()["io.cri-containerd.image"])
 | |
| 
 | |
| 	t.Logf("the image should be labeled")
 | |
| 	img, err := containerdClient.GetImage(ctx, testImage)
 | |
| 	assert.NoError(t, err)
 | |
| 	assert.Equal(t, "bar", img.Labels()["foo"])
 | |
| 	assert.Equal(t, labels.ImageLabelValue, img.Labels()[labels.ImageLabelKey])
 | |
| 
 | |
| 	t.Logf("the image should be pinned")
 | |
| 	i, err = imageService.ImageStatus(&runtime.ImageSpec{Image: testImage})
 | |
| 	require.NoError(t, err)
 | |
| 	require.NotNil(t, i)
 | |
| 	assert.True(t, i.Pinned)
 | |
| 
 | |
| 	t.Logf("should be able to start container with the image")
 | |
| 	sb, sbConfig := PodSandboxConfigWithCleanup(t, "sandbox", "containerd-image")
 | |
| 
 | |
| 	cnConfig := ContainerConfig(
 | |
| 		"test-container",
 | |
| 		id,
 | |
| 		WithCommand("sleep", "300"),
 | |
| 	)
 | |
| 	cn, err := runtimeService.CreateContainer(sb, cnConfig, sbConfig)
 | |
| 	require.NoError(t, err)
 | |
| 	require.NoError(t, runtimeService.StartContainer(cn))
 | |
| 	checkContainer := func() (bool, error) {
 | |
| 		s, err := runtimeService.ContainerStatus(cn)
 | |
| 		if err != nil {
 | |
| 			return false, err
 | |
| 		}
 | |
| 		if s.Resources == nil || (s.Resources.Linux == nil && s.Resources.Windows == nil) {
 | |
| 			return false, fmt.Errorf("No Resource field in container status: %+v", s)
 | |
| 		}
 | |
| 		return s.GetState() == runtime.ContainerState_CONTAINER_RUNNING, nil
 | |
| 	}
 | |
| 	require.NoError(t, Eventually(checkContainer, 100*time.Millisecond, 10*time.Second))
 | |
| 	require.NoError(t, Consistently(checkContainer, 100*time.Millisecond, time.Second))
 | |
| }
 | |
| 
 | |
| // Test image managed by CRI plugin shouldn't be affected by images in other namespaces.
 | |
| func TestContainerdImageInOtherNamespaces(t *testing.T) {
 | |
| 	var testImage = images.Get(images.BusyBox)
 | |
| 	ctx := context.Background()
 | |
| 
 | |
| 	t.Logf("make sure the test image doesn't exist in the cri plugin")
 | |
| 	i, err := imageService.ImageStatus(&runtime.ImageSpec{Image: testImage})
 | |
| 	require.NoError(t, err)
 | |
| 	if i != nil {
 | |
| 		require.NoError(t, imageService.RemoveImage(&runtime.ImageSpec{Image: testImage}))
 | |
| 	}
 | |
| 
 | |
| 	t.Logf("pull the image into test namespace")
 | |
| 	namespacedCtx := namespaces.WithNamespace(ctx, "test")
 | |
| 	_, err = containerdClient.Pull(namespacedCtx, testImage, containerd.WithPullUnpack)
 | |
| 	assert.NoError(t, err)
 | |
| 	defer func() {
 | |
| 		// Make sure the image is cleaned up in any case.
 | |
| 		if err := containerdClient.ImageService().Delete(namespacedCtx, testImage); err != nil {
 | |
| 			assert.True(t, errdefs.IsNotFound(err), err)
 | |
| 		}
 | |
| 		assert.NoError(t, imageService.RemoveImage(&runtime.ImageSpec{Image: testImage}))
 | |
| 	}()
 | |
| 
 | |
| 	t.Logf("cri plugin should not see the image")
 | |
| 	checkImage := func() (bool, error) {
 | |
| 		img, err := imageService.ImageStatus(&runtime.ImageSpec{Image: testImage})
 | |
| 		if err != nil {
 | |
| 			return false, err
 | |
| 		}
 | |
| 		return img == nil, nil
 | |
| 	}
 | |
| 	require.NoError(t, Consistently(checkImage, 100*time.Millisecond, time.Second))
 | |
| 
 | |
| 	PodSandboxConfigWithCleanup(t, "sandbox", "test")
 | |
| 	EnsureImageExists(t, testImage)
 | |
| 
 | |
| 	t.Logf("cri plugin should see the image now")
 | |
| 	img, err := imageService.ImageStatus(&runtime.ImageSpec{Image: testImage})
 | |
| 	require.NoError(t, err)
 | |
| 	assert.NotNil(t, img)
 | |
| 
 | |
| 	t.Logf("remove the image from test namespace")
 | |
| 	require.NoError(t, containerdClient.ImageService().Delete(namespacedCtx, testImage))
 | |
| 
 | |
| 	t.Logf("cri plugin should still see the image")
 | |
| 	checkImage = func() (bool, error) {
 | |
| 		img, err := imageService.ImageStatus(&runtime.ImageSpec{Image: testImage})
 | |
| 		if err != nil {
 | |
| 			return false, err
 | |
| 		}
 | |
| 		return img != nil, nil
 | |
| 	}
 | |
| 	assert.NoError(t, Consistently(checkImage, 100*time.Millisecond, time.Second))
 | |
| }
 | |
| 
 | |
| func TestContainerdSandboxImage(t *testing.T) {
 | |
| 	var pauseImage = images.Get(images.Pause)
 | |
| 	ctx := context.Background()
 | |
| 
 | |
| 	t.Log("make sure the pause image exist")
 | |
| 	pauseImg, err := containerdClient.GetImage(ctx, pauseImage)
 | |
| 	require.NoError(t, err)
 | |
| 	t.Log("ensure correct labels are set on pause image")
 | |
| 	assert.Equal(t, "pinned", pauseImg.Labels()["io.cri-containerd.pinned"])
 | |
| 
 | |
| 	t.Log("pause image should be seen by cri plugin")
 | |
| 	pimg, err := imageService.ImageStatus(&runtime.ImageSpec{Image: pauseImage})
 | |
| 	require.NoError(t, err)
 | |
| 	require.NotNil(t, pimg)
 | |
| 	t.Log("verify pinned field is set for pause image")
 | |
| 	assert.True(t, pimg.Pinned)
 | |
| }
 | |
| 
 | |
| func TestContainerdSandboxImagePulledOutsideCRI(t *testing.T) {
 | |
| 	var pauseImage = images.Get(images.Pause)
 | |
| 	ctx := context.Background()
 | |
| 
 | |
| 	t.Log("make sure the pause image does not exist")
 | |
| 	imageService.RemoveImage(&runtime.ImageSpec{Image: pauseImage})
 | |
| 
 | |
| 	t.Log("pull pause image")
 | |
| 	_, err := containerdClient.Pull(ctx, pauseImage)
 | |
| 	assert.NoError(t, err)
 | |
| 
 | |
| 	t.Log("pause image should be seen by cri plugin")
 | |
| 	var pimg *runtime.Image
 | |
| 	require.NoError(t, Eventually(func() (bool, error) {
 | |
| 		pimg, err = imageService.ImageStatus(&runtime.ImageSpec{Image: pauseImage})
 | |
| 		return pimg != nil, err
 | |
| 	}, time.Second, 10*time.Second))
 | |
| 
 | |
| 	t.Log("verify pinned field is set for pause image")
 | |
| 	assert.True(t, pimg.Pinned)
 | |
| 
 | |
| 	t.Log("make sure the pause image exist")
 | |
| 	pauseImg, err := containerdClient.GetImage(ctx, pauseImage)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	t.Log("ensure correct labels are set on pause image")
 | |
| 	assert.Equal(t, "pinned", pauseImg.Labels()["io.cri-containerd.pinned"])
 | |
| }
 | |
| 
 | |
| func TestContainerdImageWithDockerSchema1(t *testing.T) {
 | |
| 	t.Setenv(deprecation.EnvPullSchema1Image, "1")
 | |
| 	if goruntime.GOOS == "windows" {
 | |
| 		t.Skip("Skipped on Windows because the test image is not a multi-platform one.")
 | |
| 	}
 | |
| 
 | |
| 	var testImage = images.Get(images.DockerSchema1)
 | |
| 	digest := strings.Split(testImage, "@")[1]
 | |
| 	ctx := context.Background()
 | |
| 
 | |
| 	t.Logf("make sure the test image doesn't exist in the cri plugin")
 | |
| 	i, err := imageService.ImageStatus(&runtime.ImageSpec{Image: testImage})
 | |
| 	require.NoError(t, err)
 | |
| 	if i != nil {
 | |
| 		require.NoError(t, imageService.RemoveImage(&runtime.ImageSpec{Image: testImage}))
 | |
| 	}
 | |
| 
 | |
| 	t.Logf("pull the image into containerd")
 | |
| 	//nolint:staticcheck // Ignore SA1019. Need to keep deprecated package for compatibility.
 | |
| 	_, err = containerdClient.Pull(ctx, testImage, containerd.WithPullUnpack, containerd.WithSchema1Conversion)
 | |
| 	require.NoError(t, err)
 | |
| 	defer func() {
 | |
| 		// Make sure the image is cleaned up in any case.
 | |
| 		if err := containerdClient.ImageService().Delete(ctx, testImage); err != nil {
 | |
| 			assert.True(t, errdefs.IsNotFound(err), err)
 | |
| 		}
 | |
| 		assert.NoError(t, imageService.RemoveImage(&runtime.ImageSpec{Image: testImage}))
 | |
| 	}()
 | |
| 
 | |
| 	imgByRef, err := containerdClient.GetImage(ctx, testImage)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	t.Logf("the image should be marked as managed")
 | |
| 	assert.Equal(t, "managed", imgByRef.Labels()["io.cri-containerd.image"])
 | |
| 
 | |
| 	t.Logf("the image should be marked as dokcker schema1 with its original digest")
 | |
| 	assert.Equal(t, digest, imgByRef.Labels()["io.containerd.image/converted-docker-schema1"])
 | |
| }
 |