blob: 440f824556a0e451b994da324ad5e77d2cb31db2 [file] [log] [blame] [edit]
/*
Copyright The containerd Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package integration
import (
"context"
"os"
"path/filepath"
"strings"
"testing"
"time"
"github.com/containerd/containerd/v2/core/mount"
"github.com/containerd/containerd/v2/integration/images"
kernel "github.com/containerd/containerd/v2/pkg/kernelversion"
"github.com/containerd/containerd/v2/pkg/namespaces"
"github.com/containerd/errdefs"
"github.com/opencontainers/image-spec/identity"
"github.com/opencontainers/selinux/go-selinux"
"github.com/stretchr/testify/require"
criruntime "k8s.io/cri-api/pkg/apis/runtime/v1"
)
func TestImageVolumeBasic(t *testing.T) {
ctx := namespaces.WithNamespace(context.Background(), "k8s.io")
snSrv := containerdClient.SnapshotService("overlayfs")
for _, tc := range []struct {
name string
containerImage string
selinuxLevel string
imageVolumeImage, imageSubPath string
containerPath string
createContainerError string
execSyncCommands []string
execSyncError string
execSyncOutput string
}{
{
name: "should be readonly content",
containerImage: images.Get(images.Alpine),
imageVolumeImage: images.Get(images.Pause),
containerPath: "/image-mount",
execSyncCommands: []string{"rm", "/image-mount/pause"},
execSyncError: "can't remove '/image-mount/pause': Read-only file system",
},
{
name: "should apply selinux labels - s0:c4,c5",
containerImage: images.Get(images.ResourceConsumer),
selinuxLevel: "s0:c4,c5",
imageVolumeImage: images.Get(images.Pause),
containerPath: "/image-mount",
execSyncCommands: []string{"ls", "-Z", "/image-mount"},
execSyncOutput: "system_u:object_r:container_file_t:s0:c4,c5 pause",
},
{
name: "should apply selinux labels - s0:c200,c100",
containerImage: images.Get(images.ResourceConsumer),
selinuxLevel: "s0:c200,c100",
imageVolumeImage: images.Get(images.Pause),
containerPath: "/image-mount",
execSyncCommands: []string{"ls", "-Z", "/image-mount"},
execSyncOutput: "system_u:object_r:container_file_t:s0:c100,c200 pause",
},
{
name: "should only mount image subpath",
containerImage: images.Get(images.Alpine),
imageVolumeImage: images.Get(images.Alpine),
imageSubPath: "etc",
containerPath: "/image-mount",
execSyncCommands: []string{"ls", filepath.Join("/image-mount", "os-release")},
execSyncOutput: filepath.Join("/image-mount", "os-release"),
},
{
name: "fail to mount single file subpath",
containerImage: images.Get(images.Alpine),
imageVolumeImage: images.Get(images.Pause),
imageSubPath: "pause",
containerPath: "/image-mount",
createContainerError: "only directory subpath is supported",
},
{
name: "fail to mount non-existent subpath",
containerImage: images.Get(images.Alpine),
imageVolumeImage: images.Get(images.Alpine),
imageSubPath: "non-existent-subpath",
containerPath: "/image-mount",
createContainerError: "no such file or directory",
},
{
name: "fail to mount absolute subpath",
containerImage: images.Get(images.Alpine),
imageVolumeImage: images.Get(images.Alpine),
imageSubPath: "/etc",
containerPath: "/image-mount",
createContainerError: "path escapes from parent",
},
{
name: "fail to mount escaped subpath",
containerImage: images.Get(images.Alpine),
imageVolumeImage: images.Get(images.Alpine),
imageSubPath: "etc/../../..",
containerPath: "/image-mount",
createContainerError: "path escapes from parent",
},
{
name: "fail to mount a symlink file that escapes subpath",
containerImage: images.Get(images.Alpine),
imageVolumeImage: images.Get(images.Alpine),
imageSubPath: "bin/sh", // `bin/sh` is a symlink to `/bin/busybox` in the mount image
containerPath: "/image-mount",
createContainerError: "path escapes from parent",
},
} {
t.Run(tc.name, func(t *testing.T) {
if tc.selinuxLevel != "" {
if !selinux.GetEnabled() {
t.Skip("SELinux is not enabled")
}
}
podCtx, cnID, err := setupRunningContainerWithImageVolume(t, tc.selinuxLevel, tc.containerImage, tc.imageVolumeImage, tc.imageSubPath, tc.containerPath)
if err != nil {
require.NotEmpty(t, tc.createContainerError)
require.Contains(t, err.Error(), tc.createContainerError)
return
}
require.Empty(t, tc.createContainerError)
cleanup := true
defer func() {
if cleanup {
podCtx.stop(true)
}
}()
volumeImg, err := containerdClient.GetImage(ctx, tc.imageVolumeImage)
require.NoError(t, err)
volumeImgTarget := filepath.Join(podCtx.imageVolumeDir(), volumeImg.Target().Digest.Encoded())
_, err = snSrv.Mounts(ctx, volumeImgTarget)
require.NoError(t, err)
defer func() {
podCtx.stop(true)
cleanup = false
t.Log("Check snapshot after deleting pod")
for range 30 {
_, err := snSrv.Mounts(ctx, volumeImgTarget)
if errdefs.IsNotFound(err) {
return
}
time.Sleep(1 * time.Second)
}
t.Fatalf("%s should be deleted", volumeImgTarget)
}()
stdout, stderr, err := runtimeService.ExecSync(cnID, tc.execSyncCommands, 0)
if tc.execSyncError != "" {
require.Error(t, err)
require.ErrorContains(t, err, tc.execSyncError)
return
}
require.NoError(t, err)
require.Len(t, stderr, 0)
require.Contains(t, string(stdout), tc.execSyncOutput)
})
}
}
func setupRunningContainerWithImageVolume(t *testing.T, selinuxLevel string, containerImage string, imageVolumeName, imageSubPath, containerPath string) (podCtx *podTCtx, cnID string, err error) {
podLogDir := t.TempDir()
podOpts := []PodSandboxOpts{
WithPodLogDirectory(podLogDir),
}
if selinuxLevel != "" {
podOpts = append(podOpts, WithSelinuxLevel(selinuxLevel))
}
podCtx = newPodTCtx(t, runtimeService, t.Name(), "image-voloume", podOpts...)
defer func() {
if t.Failed() || err != nil {
podCtx.stop(true)
}
}()
pullImagesByCRI(t, imageService, containerImage, imageVolumeName)
containerName := "running"
cfg := ContainerConfig(containerName, containerImage,
WithCommand("sleep", "1d"),
WithImageVolumeMount(imageVolumeName, imageSubPath, containerPath),
WithLogPath(containerName),
)
cnID, err = podCtx.rSvc.CreateContainer(podCtx.id, cfg, podCtx.cfg)
if err != nil {
return podCtx, "", err
}
require.NoError(t, podCtx.rSvc.StartContainer(cnID))
return podCtx, cnID, nil
}
func TestImageVolumeCheckVolatileOption(t *testing.T) {
ok, _ := kernel.GreaterEqualThan(
kernel.KernelVersion{
Kernel: 5, Major: 10,
},
)
if !ok {
t.Skip("Skip since kernel version < 5.10")
}
containerImage := images.Get(images.Alpine)
podCtx, _, err := setupRunningContainerWithImageVolume(t, "", containerImage, containerImage, "", "/alpine")
require.NoError(t, err)
t.Cleanup(func() {
podCtx.stop(true)
})
imageVolumeDir := podCtx.imageVolumeDir()
entries, err := os.ReadDir(imageVolumeDir)
require.NoError(t, err)
require.Len(t, entries, 1)
imageVolumeMount := filepath.Join(imageVolumeDir, entries[0].Name())
mpInfo, err := mount.Lookup(imageVolumeMount)
require.NoError(t, err)
require.Equal(t, mpInfo.Mountpoint, imageVolumeMount)
require.Equal(t, "overlay", mpInfo.FSType)
require.Contains(t, strings.Split(mpInfo.VFSOptions, ","), "volatile")
}
func TestImageVolumeSetupIfContainerdRestarts(t *testing.T) {
ctx := namespaces.WithNamespace(context.Background(), "k8s.io")
alpineImage := images.Get(images.Alpine)
pullImagesByCRI(t, imageService, alpineImage)
img, err := containerdClient.GetImage(ctx, alpineImage)
require.NoError(t, err)
diffIDs, err := img.RootFS(ctx)
require.NoError(t, err)
alpineImageChainID := identity.ChainID(diffIDs).String()
alpineImageTarget := img.Target().Digest.Encoded()
snSrv := containerdClient.SnapshotService("overlayfs")
for _, tc := range []struct {
name string
beforeCreateContainer func(t *testing.T, podCtx *podTCtx)
}{
{
name: "create target snapshot first",
beforeCreateContainer: func(t *testing.T, podCtx *podTCtx) {
target := filepath.Join(podCtx.imageVolumeDir(), alpineImageTarget)
_, err := snSrv.Prepare(ctx, target, alpineImageChainID)
require.NoError(t, err)
},
},
{
name: "create target snapshot/dir first",
beforeCreateContainer: func(t *testing.T, podCtx *podTCtx) {
target := filepath.Join(podCtx.imageVolumeDir(), alpineImageTarget)
_, err := snSrv.Prepare(ctx, target, alpineImageChainID)
require.NoError(t, err)
require.NoError(t, os.MkdirAll(target, 0755))
},
},
} {
t.Run(tc.name, func(t *testing.T) {
podCtx := newPodTCtx(t, runtimeService, t.Name(), "image-voloume")
defer func() {
podCtx.stop(true)
}()
targetVolumeMount := filepath.Join(podCtx.imageVolumeDir(), alpineImageTarget)
tc.beforeCreateContainer(t, podCtx)
podCtx.createContainer("running-1",
alpineImage,
criruntime.ContainerState_CONTAINER_RUNNING,
WithCommand("sleep", "1d"),
WithImageVolumeMount(alpineImage, "", "/alpine-2"))
mpInfo1, err := mount.Lookup(targetVolumeMount)
require.NoError(t, err)
require.Equal(t, targetVolumeMount, mpInfo1.Mountpoint)
podCtx.createContainer("running-2",
alpineImage,
criruntime.ContainerState_CONTAINER_RUNNING,
WithCommand("sleep", "1d"),
WithImageVolumeMount(alpineImage, "", "/alpine-2"))
mpInfo2, err := mount.Lookup(targetVolumeMount)
require.NoError(t, err)
require.Equal(t, mpInfo1, mpInfo2, "should not mount twice")
})
}
}