2014-10-17 08:00:59 +08:00
|
|
|
package integration
|
|
|
|
|
|
|
|
import (
|
2014-12-25 23:43:05 +08:00
|
|
|
"bytes"
|
2015-09-14 08:35:22 +08:00
|
|
|
"fmt"
|
2014-12-25 23:43:05 +08:00
|
|
|
"io/ioutil"
|
2014-10-29 06:00:28 +08:00
|
|
|
"os"
|
2015-10-02 05:03:02 +08:00
|
|
|
"os/exec"
|
2015-04-17 04:55:12 +08:00
|
|
|
"path/filepath"
|
2015-09-14 08:35:22 +08:00
|
|
|
"reflect"
|
2015-03-26 03:41:09 +08:00
|
|
|
"strconv"
|
2014-10-17 08:00:59 +08:00
|
|
|
"strings"
|
2015-04-17 04:55:12 +08:00
|
|
|
"syscall"
|
2014-10-17 08:00:59 +08:00
|
|
|
"testing"
|
2014-11-25 06:39:32 +08:00
|
|
|
|
2015-06-22 10:29:59 +08:00
|
|
|
"github.com/opencontainers/runc/libcontainer"
|
|
|
|
"github.com/opencontainers/runc/libcontainer/cgroups/systemd"
|
|
|
|
"github.com/opencontainers/runc/libcontainer/configs"
|
2014-10-17 08:00:59 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestExecPS(t *testing.T) {
|
2015-02-04 19:21:03 +08:00
|
|
|
testExecPS(t, false)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestUsernsExecPS(t *testing.T) {
|
|
|
|
if _, err := os.Stat("/proc/self/ns/user"); os.IsNotExist(err) {
|
|
|
|
t.Skip("userns is unsupported")
|
|
|
|
}
|
|
|
|
testExecPS(t, true)
|
|
|
|
}
|
|
|
|
|
|
|
|
func testExecPS(t *testing.T, userns bool) {
|
2014-10-17 08:00:59 +08:00
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
2015-02-04 09:44:58 +08:00
|
|
|
rootfs, err := newRootfs()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2014-10-17 08:00:59 +08:00
|
|
|
defer remove(rootfs)
|
|
|
|
config := newTemplateConfig(rootfs)
|
2015-02-04 19:21:03 +08:00
|
|
|
if userns {
|
|
|
|
config.UidMappings = []configs.IDMap{{0, 0, 1000}}
|
|
|
|
config.GidMappings = []configs.IDMap{{0, 0, 1000}}
|
|
|
|
config.Namespaces = append(config.Namespaces, configs.Namespace{Type: configs.NEWUSER})
|
|
|
|
}
|
|
|
|
|
2014-10-17 08:00:59 +08:00
|
|
|
buffers, exitCode, err := runContainer(config, "", "ps")
|
|
|
|
if err != nil {
|
2015-02-07 13:12:27 +08:00
|
|
|
t.Fatalf("%s: %s", buffers, err)
|
2014-10-17 08:00:59 +08:00
|
|
|
}
|
|
|
|
if exitCode != 0 {
|
|
|
|
t.Fatalf("exit code not 0. code %d stderr %q", exitCode, buffers.Stderr)
|
|
|
|
}
|
|
|
|
lines := strings.Split(buffers.Stdout.String(), "\n")
|
|
|
|
if len(lines) < 2 {
|
|
|
|
t.Fatalf("more than one process running for output %q", buffers.Stdout.String())
|
|
|
|
}
|
|
|
|
expected := `1 root ps`
|
|
|
|
actual := strings.Trim(lines[1], "\n ")
|
|
|
|
if actual != expected {
|
|
|
|
t.Fatalf("expected output %q but received %q", expected, actual)
|
|
|
|
}
|
|
|
|
}
|
2014-10-29 06:00:28 +08:00
|
|
|
|
2014-10-29 06:08:04 +08:00
|
|
|
func TestIPCPrivate(t *testing.T) {
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2015-02-04 09:44:58 +08:00
|
|
|
rootfs, err := newRootfs()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2014-10-29 06:08:04 +08:00
|
|
|
defer remove(rootfs)
|
|
|
|
|
|
|
|
l, err := os.Readlink("/proc/1/ns/ipc")
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2014-10-29 06:08:04 +08:00
|
|
|
|
|
|
|
config := newTemplateConfig(rootfs)
|
|
|
|
buffers, exitCode, err := runContainer(config, "", "readlink", "/proc/self/ns/ipc")
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2014-10-29 06:08:04 +08:00
|
|
|
|
|
|
|
if exitCode != 0 {
|
|
|
|
t.Fatalf("exit code not 0. code %d stderr %q", exitCode, buffers.Stderr)
|
|
|
|
}
|
|
|
|
|
|
|
|
if actual := strings.Trim(buffers.Stdout.String(), "\n"); actual == l {
|
2015-01-27 20:54:19 +08:00
|
|
|
t.Fatalf("ipc link should be private to the container but equals host %q %q", actual, l)
|
2014-10-29 06:08:04 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-10-29 06:00:28 +08:00
|
|
|
func TestIPCHost(t *testing.T) {
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2015-02-04 09:44:58 +08:00
|
|
|
rootfs, err := newRootfs()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2014-10-29 06:00:28 +08:00
|
|
|
defer remove(rootfs)
|
|
|
|
|
|
|
|
l, err := os.Readlink("/proc/1/ns/ipc")
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2014-10-29 06:00:28 +08:00
|
|
|
|
|
|
|
config := newTemplateConfig(rootfs)
|
2015-01-27 20:54:19 +08:00
|
|
|
config.Namespaces.Remove(configs.NEWIPC)
|
2014-10-29 06:00:28 +08:00
|
|
|
buffers, exitCode, err := runContainer(config, "", "readlink", "/proc/self/ns/ipc")
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2014-10-29 06:00:28 +08:00
|
|
|
|
|
|
|
if exitCode != 0 {
|
|
|
|
t.Fatalf("exit code not 0. code %d stderr %q", exitCode, buffers.Stderr)
|
|
|
|
}
|
|
|
|
|
|
|
|
if actual := strings.Trim(buffers.Stdout.String(), "\n"); actual != l {
|
|
|
|
t.Fatalf("ipc link not equal to host link %q %q", actual, l)
|
|
|
|
}
|
|
|
|
}
|
2014-10-29 06:08:04 +08:00
|
|
|
|
|
|
|
func TestIPCJoinPath(t *testing.T) {
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2015-02-04 09:44:58 +08:00
|
|
|
rootfs, err := newRootfs()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2014-10-29 06:08:04 +08:00
|
|
|
defer remove(rootfs)
|
|
|
|
|
|
|
|
l, err := os.Readlink("/proc/1/ns/ipc")
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2014-10-29 06:08:04 +08:00
|
|
|
|
|
|
|
config := newTemplateConfig(rootfs)
|
2015-01-27 20:54:19 +08:00
|
|
|
config.Namespaces.Add(configs.NEWIPC, "/proc/1/ns/ipc")
|
2014-10-29 06:08:04 +08:00
|
|
|
|
|
|
|
buffers, exitCode, err := runContainer(config, "", "readlink", "/proc/self/ns/ipc")
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2014-10-29 06:08:04 +08:00
|
|
|
|
|
|
|
if exitCode != 0 {
|
|
|
|
t.Fatalf("exit code not 0. code %d stderr %q", exitCode, buffers.Stderr)
|
|
|
|
}
|
|
|
|
|
|
|
|
if actual := strings.Trim(buffers.Stdout.String(), "\n"); actual != l {
|
|
|
|
t.Fatalf("ipc link not equal to host link %q %q", actual, l)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestIPCBadPath(t *testing.T) {
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2015-02-04 09:44:58 +08:00
|
|
|
rootfs, err := newRootfs()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2014-10-29 06:08:04 +08:00
|
|
|
defer remove(rootfs)
|
|
|
|
|
|
|
|
config := newTemplateConfig(rootfs)
|
2015-01-27 20:54:19 +08:00
|
|
|
config.Namespaces.Add(configs.NEWIPC, "/proc/1/ns/ipcc")
|
2014-10-29 06:08:04 +08:00
|
|
|
|
|
|
|
_, _, err = runContainer(config, "", "true")
|
|
|
|
if err == nil {
|
2015-01-27 20:54:19 +08:00
|
|
|
t.Fatal("container succeeded with bad ipc path")
|
2014-10-29 06:08:04 +08:00
|
|
|
}
|
|
|
|
}
|
2014-11-27 02:16:53 +08:00
|
|
|
|
|
|
|
func TestRlimit(t *testing.T) {
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2015-02-04 09:44:58 +08:00
|
|
|
rootfs, err := newRootfs()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2014-11-27 02:16:53 +08:00
|
|
|
defer remove(rootfs)
|
|
|
|
|
|
|
|
config := newTemplateConfig(rootfs)
|
|
|
|
out, _, err := runContainer(config, "", "/bin/sh", "-c", "ulimit -n")
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2015-03-04 17:10:53 +08:00
|
|
|
if limit := strings.TrimSpace(out.Stdout.String()); limit != "1025" {
|
|
|
|
t.Fatalf("expected rlimit to be 1025, got %s", limit)
|
2014-11-27 02:16:53 +08:00
|
|
|
}
|
|
|
|
}
|
2014-11-25 06:39:32 +08:00
|
|
|
|
2014-12-25 23:43:05 +08:00
|
|
|
func newTestRoot() (string, error) {
|
|
|
|
dir, err := ioutil.TempDir("", "libcontainer")
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
if err := os.MkdirAll(dir, 0700); err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
return dir, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestEnter(t *testing.T) {
|
2015-01-19 22:12:00 +08:00
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
2014-12-25 23:43:05 +08:00
|
|
|
root, err := newTestRoot()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2014-12-25 23:43:05 +08:00
|
|
|
defer os.RemoveAll(root)
|
|
|
|
|
2015-02-04 09:44:58 +08:00
|
|
|
rootfs, err := newRootfs()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2014-12-25 23:43:05 +08:00
|
|
|
defer remove(rootfs)
|
|
|
|
|
|
|
|
config := newTemplateConfig(rootfs)
|
|
|
|
|
|
|
|
container, err := factory.Create("test", config)
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2014-12-25 23:43:05 +08:00
|
|
|
defer container.Destroy()
|
|
|
|
|
|
|
|
// Execute a first process in the container
|
|
|
|
stdinR, stdinW, err := os.Pipe()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2014-12-25 23:43:05 +08:00
|
|
|
|
|
|
|
var stdout, stdout2 bytes.Buffer
|
|
|
|
|
2015-02-03 18:53:31 +08:00
|
|
|
pconfig := libcontainer.Process{
|
2016-01-15 07:21:36 +08:00
|
|
|
Cwd: "/",
|
2014-12-25 23:43:05 +08:00
|
|
|
Args: []string{"sh", "-c", "cat && readlink /proc/self/ns/pid"},
|
2015-02-07 11:16:11 +08:00
|
|
|
Env: standardEnvironment,
|
2014-12-25 23:43:05 +08:00
|
|
|
Stdin: stdinR,
|
|
|
|
Stdout: &stdout,
|
|
|
|
}
|
2015-02-23 17:26:43 +08:00
|
|
|
err = container.Start(&pconfig)
|
2014-12-25 23:43:05 +08:00
|
|
|
stdinR.Close()
|
|
|
|
defer stdinW.Close()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2015-02-23 17:26:43 +08:00
|
|
|
pid, err := pconfig.Pid()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2014-12-25 23:43:05 +08:00
|
|
|
|
2015-03-04 09:30:36 +08:00
|
|
|
// Execute another process in the container
|
2015-01-21 17:29:53 +08:00
|
|
|
stdinR2, stdinW2, err := os.Pipe()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2015-02-23 17:26:43 +08:00
|
|
|
pconfig2 := libcontainer.Process{
|
2016-01-15 07:21:36 +08:00
|
|
|
Cwd: "/",
|
2015-02-23 17:26:43 +08:00
|
|
|
Env: standardEnvironment,
|
|
|
|
}
|
|
|
|
pconfig2.Args = []string{"sh", "-c", "cat && readlink /proc/self/ns/pid"}
|
|
|
|
pconfig2.Stdin = stdinR2
|
|
|
|
pconfig2.Stdout = &stdout2
|
2014-12-25 23:43:05 +08:00
|
|
|
|
2015-02-23 17:26:43 +08:00
|
|
|
err = container.Start(&pconfig2)
|
2015-01-21 17:29:53 +08:00
|
|
|
stdinR2.Close()
|
|
|
|
defer stdinW2.Close()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2014-12-25 23:43:05 +08:00
|
|
|
|
2015-02-23 17:26:43 +08:00
|
|
|
pid2, err := pconfig2.Pid()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2015-02-23 17:26:43 +08:00
|
|
|
|
2015-01-21 17:29:53 +08:00
|
|
|
processes, err := container.Processes()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2015-01-21 17:29:53 +08:00
|
|
|
|
|
|
|
n := 0
|
|
|
|
for i := range processes {
|
|
|
|
if processes[i] == pid || processes[i] == pid2 {
|
|
|
|
n++
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if n != 2 {
|
|
|
|
t.Fatal("unexpected number of processes", processes, pid, pid2)
|
|
|
|
}
|
|
|
|
|
2015-01-21 23:41:30 +08:00
|
|
|
// Wait processes
|
2015-01-21 17:29:53 +08:00
|
|
|
stdinW2.Close()
|
2015-02-23 17:26:43 +08:00
|
|
|
waitProcess(&pconfig2, t)
|
2014-12-25 23:43:05 +08:00
|
|
|
|
|
|
|
stdinW.Close()
|
2015-02-23 17:26:43 +08:00
|
|
|
waitProcess(&pconfig, t)
|
2014-12-25 23:43:05 +08:00
|
|
|
|
|
|
|
// Check that both processes live in the same pidns
|
|
|
|
pidns := string(stdout.Bytes())
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2014-12-25 23:43:05 +08:00
|
|
|
|
|
|
|
pidns2 := string(stdout2.Bytes())
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2014-12-25 23:43:05 +08:00
|
|
|
|
|
|
|
if pidns != pidns2 {
|
|
|
|
t.Fatal("The second process isn't in the required pid namespace", pidns, pidns2)
|
|
|
|
}
|
|
|
|
}
|
2015-01-19 22:12:00 +08:00
|
|
|
|
2015-03-04 09:30:36 +08:00
|
|
|
func TestProcessEnv(t *testing.T) {
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
root, err := newTestRoot()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2015-03-04 09:30:36 +08:00
|
|
|
defer os.RemoveAll(root)
|
|
|
|
|
|
|
|
rootfs, err := newRootfs()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2015-03-04 09:30:36 +08:00
|
|
|
defer remove(rootfs)
|
|
|
|
|
|
|
|
config := newTemplateConfig(rootfs)
|
|
|
|
|
|
|
|
container, err := factory.Create("test", config)
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2015-03-04 09:30:36 +08:00
|
|
|
defer container.Destroy()
|
|
|
|
|
|
|
|
var stdout bytes.Buffer
|
|
|
|
pconfig := libcontainer.Process{
|
2016-01-15 07:21:36 +08:00
|
|
|
Cwd: "/",
|
2015-03-06 06:33:13 +08:00
|
|
|
Args: []string{"sh", "-c", "env"},
|
|
|
|
Env: []string{
|
|
|
|
"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
|
|
|
|
"HOSTNAME=integration",
|
|
|
|
"TERM=xterm",
|
|
|
|
"FOO=BAR",
|
|
|
|
},
|
2015-03-04 09:30:36 +08:00
|
|
|
Stdin: nil,
|
|
|
|
Stdout: &stdout,
|
|
|
|
}
|
|
|
|
err = container.Start(&pconfig)
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2015-03-04 09:30:36 +08:00
|
|
|
|
|
|
|
// Wait for process
|
|
|
|
waitProcess(&pconfig, t)
|
|
|
|
|
|
|
|
outputEnv := string(stdout.Bytes())
|
|
|
|
|
|
|
|
// Check that the environment has the key/value pair we added
|
|
|
|
if !strings.Contains(outputEnv, "FOO=BAR") {
|
|
|
|
t.Fatal("Environment doesn't have the expected FOO=BAR key/value pair: ", outputEnv)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make sure that HOME is set
|
2015-03-06 06:33:13 +08:00
|
|
|
if !strings.Contains(outputEnv, "HOME=/root") {
|
2015-03-04 09:30:36 +08:00
|
|
|
t.Fatal("Environment doesn't have HOME set: ", outputEnv)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-26 03:41:09 +08:00
|
|
|
func TestProcessCaps(t *testing.T) {
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
root, err := newTestRoot()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2015-03-26 03:41:09 +08:00
|
|
|
defer os.RemoveAll(root)
|
|
|
|
|
|
|
|
rootfs, err := newRootfs()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2015-03-26 03:41:09 +08:00
|
|
|
defer remove(rootfs)
|
|
|
|
|
|
|
|
config := newTemplateConfig(rootfs)
|
|
|
|
|
|
|
|
container, err := factory.Create("test", config)
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2015-03-26 03:41:09 +08:00
|
|
|
defer container.Destroy()
|
|
|
|
|
2015-09-10 07:25:43 +08:00
|
|
|
processCaps := append(config.Capabilities, "CAP_NET_ADMIN")
|
2015-03-26 03:41:09 +08:00
|
|
|
|
|
|
|
var stdout bytes.Buffer
|
|
|
|
pconfig := libcontainer.Process{
|
2016-01-15 07:21:36 +08:00
|
|
|
Cwd: "/",
|
2015-03-26 03:41:09 +08:00
|
|
|
Args: []string{"sh", "-c", "cat /proc/self/status"},
|
|
|
|
Env: standardEnvironment,
|
|
|
|
Capabilities: processCaps,
|
|
|
|
Stdin: nil,
|
|
|
|
Stdout: &stdout,
|
|
|
|
}
|
|
|
|
err = container.Start(&pconfig)
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2015-03-26 03:41:09 +08:00
|
|
|
|
|
|
|
// Wait for process
|
|
|
|
waitProcess(&pconfig, t)
|
|
|
|
|
|
|
|
outputStatus := string(stdout.Bytes())
|
|
|
|
|
|
|
|
lines := strings.Split(outputStatus, "\n")
|
|
|
|
|
|
|
|
effectiveCapsLine := ""
|
|
|
|
for _, l := range lines {
|
|
|
|
line := strings.TrimSpace(l)
|
|
|
|
if strings.Contains(line, "CapEff:") {
|
|
|
|
effectiveCapsLine = line
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if effectiveCapsLine == "" {
|
|
|
|
t.Fatal("Couldn't find effective caps: ", outputStatus)
|
|
|
|
}
|
|
|
|
|
|
|
|
parts := strings.Split(effectiveCapsLine, ":")
|
|
|
|
effectiveCapsStr := strings.TrimSpace(parts[1])
|
|
|
|
|
|
|
|
effectiveCaps, err := strconv.ParseUint(effectiveCapsStr, 16, 64)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal("Could not parse effective caps", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var netAdminMask uint64
|
|
|
|
var netAdminBit uint
|
|
|
|
netAdminBit = 12 // from capability.h
|
|
|
|
netAdminMask = 1 << netAdminBit
|
|
|
|
if effectiveCaps&netAdminMask != netAdminMask {
|
|
|
|
t.Fatal("CAP_NET_ADMIN is not set as expected")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-05-01 07:27:52 +08:00
|
|
|
func TestAdditionalGroups(t *testing.T) {
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
root, err := newTestRoot()
|
|
|
|
ok(t, err)
|
|
|
|
defer os.RemoveAll(root)
|
|
|
|
|
|
|
|
rootfs, err := newRootfs()
|
|
|
|
ok(t, err)
|
|
|
|
defer remove(rootfs)
|
|
|
|
|
|
|
|
config := newTemplateConfig(rootfs)
|
|
|
|
config.AdditionalGroups = []string{"plugdev", "audio"}
|
|
|
|
|
|
|
|
factory, err := libcontainer.New(root, libcontainer.Cgroupfs)
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
container, err := factory.Create("test", config)
|
|
|
|
ok(t, err)
|
|
|
|
defer container.Destroy()
|
|
|
|
|
|
|
|
var stdout bytes.Buffer
|
|
|
|
pconfig := libcontainer.Process{
|
2016-01-15 07:21:36 +08:00
|
|
|
Cwd: "/",
|
2015-05-01 07:27:52 +08:00
|
|
|
Args: []string{"sh", "-c", "id", "-Gn"},
|
|
|
|
Env: standardEnvironment,
|
|
|
|
Stdin: nil,
|
|
|
|
Stdout: &stdout,
|
|
|
|
}
|
|
|
|
err = container.Start(&pconfig)
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
// Wait for process
|
|
|
|
waitProcess(&pconfig, t)
|
|
|
|
|
|
|
|
outputGroups := string(stdout.Bytes())
|
|
|
|
|
|
|
|
// Check that the groups output has the groups that we specified
|
|
|
|
if !strings.Contains(outputGroups, "audio") {
|
|
|
|
t.Fatalf("Listed groups do not contain the audio group as expected: %v", outputGroups)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !strings.Contains(outputGroups, "plugdev") {
|
|
|
|
t.Fatalf("Listed groups do not contain the plugdev group as expected: %v", outputGroups)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-19 22:12:00 +08:00
|
|
|
func TestFreeze(t *testing.T) {
|
2015-04-03 13:15:06 +08:00
|
|
|
testFreeze(t, false)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestSystemdFreeze(t *testing.T) {
|
|
|
|
if !systemd.UseSystemd() {
|
|
|
|
t.Skip("Systemd is unsupported")
|
|
|
|
}
|
|
|
|
testFreeze(t, true)
|
|
|
|
}
|
|
|
|
|
|
|
|
func testFreeze(t *testing.T, systemd bool) {
|
2015-01-19 22:12:00 +08:00
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
root, err := newTestRoot()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2015-01-19 22:12:00 +08:00
|
|
|
defer os.RemoveAll(root)
|
|
|
|
|
2015-02-04 09:44:58 +08:00
|
|
|
rootfs, err := newRootfs()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2015-01-19 22:12:00 +08:00
|
|
|
defer remove(rootfs)
|
|
|
|
|
|
|
|
config := newTemplateConfig(rootfs)
|
2015-05-01 23:27:04 +08:00
|
|
|
f := factory
|
2015-04-03 13:15:06 +08:00
|
|
|
if systemd {
|
2015-05-01 23:27:04 +08:00
|
|
|
f = systemdFactory
|
2015-04-03 13:15:06 +08:00
|
|
|
}
|
2015-01-19 22:12:00 +08:00
|
|
|
|
2015-05-01 23:27:04 +08:00
|
|
|
container, err := f.Create("test", config)
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2015-01-19 22:12:00 +08:00
|
|
|
defer container.Destroy()
|
|
|
|
|
|
|
|
stdinR, stdinW, err := os.Pipe()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2015-01-19 22:12:00 +08:00
|
|
|
|
2015-05-21 01:10:10 +08:00
|
|
|
pconfig := &libcontainer.Process{
|
2016-01-15 07:21:36 +08:00
|
|
|
Cwd: "/",
|
2015-01-19 22:12:00 +08:00
|
|
|
Args: []string{"cat"},
|
2015-02-07 11:16:11 +08:00
|
|
|
Env: standardEnvironment,
|
2015-01-19 22:12:00 +08:00
|
|
|
Stdin: stdinR,
|
|
|
|
}
|
2015-05-21 01:10:10 +08:00
|
|
|
err = container.Start(pconfig)
|
2015-01-19 22:12:00 +08:00
|
|
|
stdinR.Close()
|
|
|
|
defer stdinW.Close()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
2015-01-19 22:12:00 +08:00
|
|
|
|
2015-04-05 04:29:50 +08:00
|
|
|
err = container.Pause()
|
|
|
|
ok(t, err)
|
2015-02-03 18:53:31 +08:00
|
|
|
state, err := container.Status()
|
2015-04-05 04:29:50 +08:00
|
|
|
ok(t, err)
|
|
|
|
err = container.Resume()
|
|
|
|
ok(t, err)
|
2015-02-12 08:45:23 +08:00
|
|
|
if state != libcontainer.Paused {
|
2015-01-21 20:24:18 +08:00
|
|
|
t.Fatal("Unexpected state: ", state)
|
|
|
|
}
|
2015-01-19 22:12:00 +08:00
|
|
|
|
|
|
|
stdinW.Close()
|
2015-05-21 01:10:10 +08:00
|
|
|
waitProcess(pconfig, t)
|
2015-01-19 22:12:00 +08:00
|
|
|
}
|
2015-04-08 05:16:29 +08:00
|
|
|
|
2015-04-17 13:51:37 +08:00
|
|
|
func TestCpuShares(t *testing.T) {
|
|
|
|
testCpuShares(t, false)
|
|
|
|
}
|
|
|
|
|
2015-06-18 15:44:30 +08:00
|
|
|
func TestCpuSharesSystemd(t *testing.T) {
|
2015-04-17 13:51:37 +08:00
|
|
|
if !systemd.UseSystemd() {
|
|
|
|
t.Skip("Systemd is unsupported")
|
|
|
|
}
|
|
|
|
testCpuShares(t, true)
|
|
|
|
}
|
|
|
|
|
|
|
|
func testCpuShares(t *testing.T, systemd bool) {
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
rootfs, err := newRootfs()
|
|
|
|
ok(t, err)
|
|
|
|
defer remove(rootfs)
|
|
|
|
|
|
|
|
config := newTemplateConfig(rootfs)
|
|
|
|
if systemd {
|
2015-12-03 12:57:02 +08:00
|
|
|
config.Cgroups.Parent = "system.slice"
|
2015-04-17 13:51:37 +08:00
|
|
|
}
|
2015-12-15 08:26:29 +08:00
|
|
|
config.Cgroups.Resources.CpuShares = 1
|
2015-04-17 13:51:37 +08:00
|
|
|
|
|
|
|
_, _, err = runContainer(config, "", "ps")
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("runContainer should failed with invalid CpuShares")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-12-14 21:33:56 +08:00
|
|
|
func TestPids(t *testing.T) {
|
|
|
|
testPids(t, false)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestPidsSystemd(t *testing.T) {
|
|
|
|
if !systemd.UseSystemd() {
|
|
|
|
t.Skip("Systemd is unsupported")
|
|
|
|
}
|
|
|
|
testPids(t, true)
|
|
|
|
}
|
|
|
|
|
|
|
|
func testPids(t *testing.T, systemd bool) {
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
rootfs, err := newRootfs()
|
|
|
|
ok(t, err)
|
|
|
|
defer remove(rootfs)
|
|
|
|
|
|
|
|
config := newTemplateConfig(rootfs)
|
|
|
|
if systemd {
|
|
|
|
config.Cgroups.Parent = "system.slice"
|
|
|
|
}
|
|
|
|
config.Cgroups.Resources.PidsLimit = -1
|
|
|
|
|
|
|
|
// Running multiple processes.
|
|
|
|
_, ret, err := runContainer(config, "", "/bin/sh", "-c", "/bin/true | /bin/true | /bin/true | /bin/true")
|
|
|
|
if err != nil && strings.Contains(err.Error(), "no such directory for pids.max") {
|
|
|
|
t.Skip("PIDs cgroup is unsupported")
|
|
|
|
}
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
if ret != 0 {
|
|
|
|
t.Fatalf("expected fork() to succeed with no pids limit")
|
|
|
|
}
|
|
|
|
|
2016-02-11 21:14:22 +08:00
|
|
|
// Enforce a permissive limit. This needs to be fairly hand-wavey due to the
|
|
|
|
// issues with running Go binaries with pids restrictions (see below).
|
|
|
|
config.Cgroups.Resources.PidsLimit = 64
|
|
|
|
_, ret, err = runContainer(config, "", "/bin/sh", "-c", `
|
|
|
|
/bin/true | /bin/true | /bin/true | /bin/true | /bin/true | /bin/true | bin/true | /bin/true |
|
|
|
|
/bin/true | /bin/true | /bin/true | /bin/true | /bin/true | /bin/true | bin/true | /bin/true |
|
|
|
|
/bin/true | /bin/true | /bin/true | /bin/true | /bin/true | /bin/true | bin/true | /bin/true |
|
|
|
|
/bin/true | /bin/true | /bin/true | /bin/true | /bin/true | /bin/true | bin/true | /bin/true`)
|
2015-12-14 21:33:56 +08:00
|
|
|
if err != nil && strings.Contains(err.Error(), "no such directory for pids.max") {
|
|
|
|
t.Skip("PIDs cgroup is unsupported")
|
|
|
|
}
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
if ret != 0 {
|
|
|
|
t.Fatalf("expected fork() to succeed with permissive pids limit")
|
|
|
|
}
|
|
|
|
|
2016-02-11 21:14:22 +08:00
|
|
|
// Enforce a restrictive limit. 64 * /bin/true + 1 * shell should cause this
|
|
|
|
// to fail reliabily.
|
|
|
|
config.Cgroups.Resources.PidsLimit = 64
|
|
|
|
out, ret, err := runContainer(config, "", "/bin/sh", "-c", `
|
|
|
|
/bin/true | /bin/true | /bin/true | /bin/true | /bin/true | /bin/true | bin/true | /bin/true |
|
|
|
|
/bin/true | /bin/true | /bin/true | /bin/true | /bin/true | /bin/true | bin/true | /bin/true |
|
|
|
|
/bin/true | /bin/true | /bin/true | /bin/true | /bin/true | /bin/true | bin/true | /bin/true |
|
|
|
|
/bin/true | /bin/true | /bin/true | /bin/true | /bin/true | /bin/true | bin/true | /bin/true |
|
|
|
|
/bin/true | /bin/true | /bin/true | /bin/true | /bin/true | /bin/true | bin/true | /bin/true |
|
|
|
|
/bin/true | /bin/true | /bin/true | /bin/true | /bin/true | /bin/true | bin/true | /bin/true |
|
|
|
|
/bin/true | /bin/true | /bin/true | /bin/true | /bin/true | /bin/true | bin/true | /bin/true |
|
|
|
|
/bin/true | /bin/true | /bin/true | /bin/true | /bin/true | /bin/true | bin/true | /bin/true`)
|
2015-12-14 21:33:56 +08:00
|
|
|
if err != nil && strings.Contains(err.Error(), "no such directory for pids.max") {
|
|
|
|
t.Skip("PIDs cgroup is unsupported")
|
|
|
|
}
|
|
|
|
if err != nil && !strings.Contains(out.String(), "sh: can't fork") {
|
|
|
|
ok(t, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("expected fork() to fail with restrictive pids limit")
|
|
|
|
}
|
2015-12-17 17:16:34 +08:00
|
|
|
|
|
|
|
// Minimal restrictions are not really supported, due to quirks in using Go
|
|
|
|
// due to the fact that it spawns random processes. While we do our best with
|
|
|
|
// late setting cgroup values, it's just too unreliable with very small pids.max.
|
|
|
|
// As such, we don't test that case. YMMV.
|
2015-12-14 21:33:56 +08:00
|
|
|
}
|
|
|
|
|
2015-06-18 15:44:30 +08:00
|
|
|
func TestRunWithKernelMemory(t *testing.T) {
|
|
|
|
testRunWithKernelMemory(t, false)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestRunWithKernelMemorySystemd(t *testing.T) {
|
|
|
|
if !systemd.UseSystemd() {
|
|
|
|
t.Skip("Systemd is unsupported")
|
|
|
|
}
|
|
|
|
testRunWithKernelMemory(t, true)
|
|
|
|
}
|
|
|
|
|
|
|
|
func testRunWithKernelMemory(t *testing.T, systemd bool) {
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
rootfs, err := newRootfs()
|
|
|
|
ok(t, err)
|
|
|
|
defer remove(rootfs)
|
|
|
|
|
|
|
|
config := newTemplateConfig(rootfs)
|
|
|
|
if systemd {
|
2015-12-03 12:57:02 +08:00
|
|
|
config.Cgroups.Parent = "system.slice"
|
2015-06-18 15:44:30 +08:00
|
|
|
}
|
2015-12-15 08:26:29 +08:00
|
|
|
config.Cgroups.Resources.KernelMemory = 52428800
|
2015-06-18 15:44:30 +08:00
|
|
|
|
|
|
|
_, _, err = runContainer(config, "", "ps")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("runContainer failed with kernel memory limit: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-08 05:16:29 +08:00
|
|
|
func TestContainerState(t *testing.T) {
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
root, err := newTestRoot()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(root)
|
|
|
|
|
|
|
|
rootfs, err := newRootfs()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer remove(rootfs)
|
|
|
|
|
|
|
|
l, err := os.Readlink("/proc/1/ns/ipc")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
config := newTemplateConfig(rootfs)
|
|
|
|
config.Namespaces = configs.Namespaces([]configs.Namespace{
|
|
|
|
{Type: configs.NEWNS},
|
|
|
|
{Type: configs.NEWUTS},
|
|
|
|
// host for IPC
|
|
|
|
//{Type: configs.NEWIPC},
|
|
|
|
{Type: configs.NEWPID},
|
|
|
|
{Type: configs.NEWNET},
|
|
|
|
})
|
|
|
|
|
|
|
|
container, err := factory.Create("test", config)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer container.Destroy()
|
|
|
|
|
|
|
|
stdinR, stdinW, err := os.Pipe()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
p := &libcontainer.Process{
|
2016-01-15 07:21:36 +08:00
|
|
|
Cwd: "/",
|
2015-04-08 05:16:29 +08:00
|
|
|
Args: []string{"cat"},
|
|
|
|
Env: standardEnvironment,
|
|
|
|
Stdin: stdinR,
|
|
|
|
}
|
|
|
|
err = container.Start(p)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
stdinR.Close()
|
2015-05-21 01:10:10 +08:00
|
|
|
defer stdinW.Close()
|
2015-04-08 05:16:29 +08:00
|
|
|
|
|
|
|
st, err := container.State()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
l1, err := os.Readlink(st.NamespacePaths[configs.NEWIPC])
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if l1 != l {
|
|
|
|
t.Fatal("Container using non-host ipc namespace")
|
|
|
|
}
|
|
|
|
stdinW.Close()
|
2015-05-21 01:10:10 +08:00
|
|
|
waitProcess(p, t)
|
2015-04-08 05:16:29 +08:00
|
|
|
}
|
2015-04-01 05:40:05 +08:00
|
|
|
|
|
|
|
func TestPassExtraFiles(t *testing.T) {
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
rootfs, err := newRootfs()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer remove(rootfs)
|
|
|
|
|
|
|
|
config := newTemplateConfig(rootfs)
|
|
|
|
|
|
|
|
container, err := factory.Create("test", config)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer container.Destroy()
|
|
|
|
|
|
|
|
var stdout bytes.Buffer
|
|
|
|
pipeout1, pipein1, err := os.Pipe()
|
|
|
|
pipeout2, pipein2, err := os.Pipe()
|
|
|
|
process := libcontainer.Process{
|
2016-01-15 07:21:36 +08:00
|
|
|
Cwd: "/",
|
2015-04-01 05:40:05 +08:00
|
|
|
Args: []string{"sh", "-c", "cd /proc/$$/fd; echo -n *; echo -n 1 >3; echo -n 2 >4"},
|
|
|
|
Env: []string{"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"},
|
|
|
|
ExtraFiles: []*os.File{pipein1, pipein2},
|
|
|
|
Stdin: nil,
|
|
|
|
Stdout: &stdout,
|
|
|
|
}
|
|
|
|
err = container.Start(&process)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
waitProcess(&process, t)
|
|
|
|
|
|
|
|
out := string(stdout.Bytes())
|
|
|
|
// fd 5 is the directory handle for /proc/$$/fd
|
|
|
|
if out != "0 1 2 3 4 5" {
|
|
|
|
t.Fatalf("expected to have the file descriptors '0 1 2 3 4 5' passed to init, got '%s'", out)
|
|
|
|
}
|
|
|
|
var buf = []byte{0}
|
|
|
|
_, err = pipeout1.Read(buf)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
out1 := string(buf)
|
|
|
|
if out1 != "1" {
|
|
|
|
t.Fatalf("expected first pipe to receive '1', got '%s'", out1)
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = pipeout2.Read(buf)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
out2 := string(buf)
|
|
|
|
if out2 != "2" {
|
|
|
|
t.Fatalf("expected second pipe to receive '2', got '%s'", out2)
|
|
|
|
}
|
|
|
|
}
|
2015-04-17 04:55:12 +08:00
|
|
|
|
|
|
|
func TestMountCmds(t *testing.T) {
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
root, err := newTestRoot()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(root)
|
|
|
|
|
|
|
|
rootfs, err := newRootfs()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer remove(rootfs)
|
|
|
|
|
|
|
|
tmpDir, err := ioutil.TempDir("", "tmpdir")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(tmpDir)
|
|
|
|
|
|
|
|
config := newTemplateConfig(rootfs)
|
|
|
|
config.Mounts = append(config.Mounts, &configs.Mount{
|
|
|
|
Source: tmpDir,
|
2015-05-08 05:46:19 +08:00
|
|
|
Destination: "/tmp",
|
2015-04-17 04:55:12 +08:00
|
|
|
Device: "bind",
|
|
|
|
Flags: syscall.MS_BIND | syscall.MS_REC,
|
|
|
|
PremountCmds: []configs.Command{
|
|
|
|
{Path: "touch", Args: []string{filepath.Join(tmpDir, "hello")}},
|
|
|
|
{Path: "touch", Args: []string{filepath.Join(tmpDir, "world")}},
|
|
|
|
},
|
|
|
|
PostmountCmds: []configs.Command{
|
|
|
|
{Path: "cp", Args: []string{filepath.Join(rootfs, "tmp", "hello"), filepath.Join(rootfs, "tmp", "hello-backup")}},
|
|
|
|
{Path: "cp", Args: []string{filepath.Join(rootfs, "tmp", "world"), filepath.Join(rootfs, "tmp", "world-backup")}},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
container, err := factory.Create("test", config)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer container.Destroy()
|
|
|
|
|
|
|
|
pconfig := libcontainer.Process{
|
2016-01-15 07:21:36 +08:00
|
|
|
Cwd: "/",
|
2015-04-17 04:55:12 +08:00
|
|
|
Args: []string{"sh", "-c", "env"},
|
|
|
|
Env: standardEnvironment,
|
|
|
|
}
|
|
|
|
err = container.Start(&pconfig)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait for process
|
|
|
|
waitProcess(&pconfig, t)
|
|
|
|
|
|
|
|
entries, err := ioutil.ReadDir(tmpDir)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
expected := []string{"hello", "hello-backup", "world", "world-backup"}
|
|
|
|
for i, e := range entries {
|
|
|
|
if e.Name() != expected[i] {
|
|
|
|
t.Errorf("Got(%s), expect %s", e.Name(), expected[i])
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2015-04-23 10:18:08 +08:00
|
|
|
|
2015-07-07 07:18:08 +08:00
|
|
|
func TestSysctl(t *testing.T) {
|
2015-04-23 10:18:08 +08:00
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
root, err := newTestRoot()
|
|
|
|
ok(t, err)
|
|
|
|
defer os.RemoveAll(root)
|
|
|
|
|
|
|
|
rootfs, err := newRootfs()
|
|
|
|
ok(t, err)
|
|
|
|
defer remove(rootfs)
|
|
|
|
|
|
|
|
config := newTemplateConfig(rootfs)
|
2015-07-07 07:18:08 +08:00
|
|
|
config.Sysctl = map[string]string{
|
2015-04-23 10:18:08 +08:00
|
|
|
"kernel.shmmni": "8192",
|
|
|
|
}
|
|
|
|
|
|
|
|
container, err := factory.Create("test", config)
|
|
|
|
ok(t, err)
|
|
|
|
defer container.Destroy()
|
|
|
|
|
|
|
|
var stdout bytes.Buffer
|
|
|
|
pconfig := libcontainer.Process{
|
2016-01-15 07:21:36 +08:00
|
|
|
Cwd: "/",
|
2015-04-23 10:18:08 +08:00
|
|
|
Args: []string{"sh", "-c", "cat /proc/sys/kernel/shmmni"},
|
|
|
|
Env: standardEnvironment,
|
|
|
|
Stdin: nil,
|
|
|
|
Stdout: &stdout,
|
|
|
|
}
|
|
|
|
err = container.Start(&pconfig)
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
// Wait for process
|
|
|
|
waitProcess(&pconfig, t)
|
|
|
|
|
|
|
|
shmmniOutput := strings.TrimSpace(string(stdout.Bytes()))
|
|
|
|
if shmmniOutput != "8192" {
|
|
|
|
t.Fatalf("kernel.shmmni property expected to be 8192, but is %s", shmmniOutput)
|
|
|
|
}
|
|
|
|
}
|
2015-04-16 08:39:12 +08:00
|
|
|
|
2015-07-16 02:07:03 +08:00
|
|
|
func TestMountCgroupRO(t *testing.T) {
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
rootfs, err := newRootfs()
|
|
|
|
ok(t, err)
|
|
|
|
defer remove(rootfs)
|
|
|
|
config := newTemplateConfig(rootfs)
|
|
|
|
|
|
|
|
config.Mounts = append(config.Mounts, &configs.Mount{
|
|
|
|
Destination: "/sys/fs/cgroup",
|
|
|
|
Device: "cgroup",
|
|
|
|
Flags: defaultMountFlags | syscall.MS_RDONLY,
|
|
|
|
})
|
|
|
|
|
|
|
|
buffers, exitCode, err := runContainer(config, "", "mount")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("%s: %s", buffers, err)
|
|
|
|
}
|
|
|
|
if exitCode != 0 {
|
|
|
|
t.Fatalf("exit code not 0. code %d stderr %q", exitCode, buffers.Stderr)
|
|
|
|
}
|
|
|
|
mountInfo := buffers.Stdout.String()
|
|
|
|
lines := strings.Split(mountInfo, "\n")
|
|
|
|
for _, l := range lines {
|
2015-07-21 23:56:37 +08:00
|
|
|
if strings.HasPrefix(l, "tmpfs on /sys/fs/cgroup") {
|
2015-08-31 11:23:18 +08:00
|
|
|
if !strings.Contains(l, "ro") ||
|
|
|
|
!strings.Contains(l, "nosuid") ||
|
|
|
|
!strings.Contains(l, "nodev") ||
|
|
|
|
!strings.Contains(l, "noexec") {
|
2015-07-21 23:56:37 +08:00
|
|
|
t.Fatalf("Mode expected to contain 'ro,nosuid,nodev,noexec': %s", l)
|
|
|
|
}
|
|
|
|
if !strings.Contains(l, "mode=755") {
|
|
|
|
t.Fatalf("Mode expected to contain 'mode=755': %s", l)
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
2015-07-16 02:07:03 +08:00
|
|
|
if !strings.HasPrefix(l, "cgroup") {
|
|
|
|
continue
|
|
|
|
}
|
2015-08-31 11:23:18 +08:00
|
|
|
if !strings.Contains(l, "ro") ||
|
|
|
|
!strings.Contains(l, "nosuid") ||
|
|
|
|
!strings.Contains(l, "nodev") ||
|
|
|
|
!strings.Contains(l, "noexec") {
|
2015-07-16 02:07:03 +08:00
|
|
|
t.Fatalf("Mode expected to contain 'ro,nosuid,nodev,noexec': %s", l)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestMountCgroupRW(t *testing.T) {
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
rootfs, err := newRootfs()
|
|
|
|
ok(t, err)
|
|
|
|
defer remove(rootfs)
|
|
|
|
config := newTemplateConfig(rootfs)
|
|
|
|
|
|
|
|
config.Mounts = append(config.Mounts, &configs.Mount{
|
|
|
|
Destination: "/sys/fs/cgroup",
|
|
|
|
Device: "cgroup",
|
|
|
|
Flags: defaultMountFlags,
|
|
|
|
})
|
|
|
|
|
|
|
|
buffers, exitCode, err := runContainer(config, "", "mount")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("%s: %s", buffers, err)
|
|
|
|
}
|
|
|
|
if exitCode != 0 {
|
|
|
|
t.Fatalf("exit code not 0. code %d stderr %q", exitCode, buffers.Stderr)
|
|
|
|
}
|
|
|
|
mountInfo := buffers.Stdout.String()
|
|
|
|
lines := strings.Split(mountInfo, "\n")
|
|
|
|
for _, l := range lines {
|
2015-07-21 23:56:37 +08:00
|
|
|
if strings.HasPrefix(l, "tmpfs on /sys/fs/cgroup") {
|
2015-08-31 11:23:18 +08:00
|
|
|
if !strings.Contains(l, "rw") ||
|
|
|
|
!strings.Contains(l, "nosuid") ||
|
|
|
|
!strings.Contains(l, "nodev") ||
|
|
|
|
!strings.Contains(l, "noexec") {
|
2015-07-21 23:56:37 +08:00
|
|
|
t.Fatalf("Mode expected to contain 'rw,nosuid,nodev,noexec': %s", l)
|
|
|
|
}
|
|
|
|
if !strings.Contains(l, "mode=755") {
|
|
|
|
t.Fatalf("Mode expected to contain 'mode=755': %s", l)
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
2015-07-16 02:07:03 +08:00
|
|
|
if !strings.HasPrefix(l, "cgroup") {
|
|
|
|
continue
|
|
|
|
}
|
2015-08-31 11:23:18 +08:00
|
|
|
if !strings.Contains(l, "rw") ||
|
|
|
|
!strings.Contains(l, "nosuid") ||
|
|
|
|
!strings.Contains(l, "nodev") ||
|
|
|
|
!strings.Contains(l, "noexec") {
|
2015-07-16 02:07:03 +08:00
|
|
|
t.Fatalf("Mode expected to contain 'rw,nosuid,nodev,noexec': %s", l)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2015-08-27 07:37:24 +08:00
|
|
|
|
|
|
|
func TestOomScoreAdj(t *testing.T) {
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
root, err := newTestRoot()
|
|
|
|
ok(t, err)
|
|
|
|
defer os.RemoveAll(root)
|
|
|
|
|
|
|
|
rootfs, err := newRootfs()
|
|
|
|
ok(t, err)
|
|
|
|
defer remove(rootfs)
|
|
|
|
|
|
|
|
config := newTemplateConfig(rootfs)
|
|
|
|
config.OomScoreAdj = 200
|
|
|
|
|
|
|
|
factory, err := libcontainer.New(root, libcontainer.Cgroupfs)
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
container, err := factory.Create("test", config)
|
|
|
|
ok(t, err)
|
|
|
|
defer container.Destroy()
|
|
|
|
|
|
|
|
var stdout bytes.Buffer
|
|
|
|
pconfig := libcontainer.Process{
|
2016-01-15 07:21:36 +08:00
|
|
|
Cwd: "/",
|
2015-08-27 07:37:24 +08:00
|
|
|
Args: []string{"sh", "-c", "cat /proc/self/oom_score_adj"},
|
|
|
|
Env: standardEnvironment,
|
|
|
|
Stdin: nil,
|
|
|
|
Stdout: &stdout,
|
|
|
|
}
|
|
|
|
err = container.Start(&pconfig)
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
// Wait for process
|
|
|
|
waitProcess(&pconfig, t)
|
|
|
|
outputOomScoreAdj := strings.TrimSpace(string(stdout.Bytes()))
|
|
|
|
|
|
|
|
// Check that the oom_score_adj matches the value that was set as part of config.
|
|
|
|
if outputOomScoreAdj != strconv.Itoa(config.OomScoreAdj) {
|
|
|
|
t.Fatalf("Expected oom_score_adj %d; got %q", config.OomScoreAdj, outputOomScoreAdj)
|
|
|
|
}
|
|
|
|
}
|
2015-08-06 06:26:29 +08:00
|
|
|
|
2015-09-12 01:28:25 +08:00
|
|
|
func TestHook(t *testing.T) {
|
2015-08-06 06:26:29 +08:00
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
root, err := newTestRoot()
|
|
|
|
ok(t, err)
|
|
|
|
defer os.RemoveAll(root)
|
|
|
|
|
|
|
|
rootfs, err := newRootfs()
|
|
|
|
ok(t, err)
|
|
|
|
defer remove(rootfs)
|
|
|
|
|
|
|
|
config := newTemplateConfig(rootfs)
|
2015-09-11 09:15:00 +08:00
|
|
|
config.Hooks = &configs.Hooks{
|
|
|
|
Prestart: []configs.Hook{
|
2015-09-12 01:28:25 +08:00
|
|
|
configs.NewFunctionHook(func(s configs.HookState) error {
|
|
|
|
f, err := os.Create(filepath.Join(s.Root, "test"))
|
2015-09-11 09:15:00 +08:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return f.Close()
|
|
|
|
}),
|
|
|
|
},
|
2015-09-12 01:28:25 +08:00
|
|
|
Poststop: []configs.Hook{
|
|
|
|
configs.NewFunctionHook(func(s configs.HookState) error {
|
|
|
|
return os.RemoveAll(filepath.Join(s.Root, "test"))
|
|
|
|
}),
|
|
|
|
},
|
2015-09-11 09:15:00 +08:00
|
|
|
}
|
2015-08-06 06:26:29 +08:00
|
|
|
container, err := factory.Create("test", config)
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
var stdout bytes.Buffer
|
|
|
|
pconfig := libcontainer.Process{
|
2016-01-15 07:21:36 +08:00
|
|
|
Cwd: "/",
|
2015-09-11 09:15:00 +08:00
|
|
|
Args: []string{"sh", "-c", "ls /test"},
|
2015-08-06 06:26:29 +08:00
|
|
|
Env: standardEnvironment,
|
|
|
|
Stdin: nil,
|
|
|
|
Stdout: &stdout,
|
|
|
|
}
|
|
|
|
err = container.Start(&pconfig)
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
// Wait for process
|
|
|
|
waitProcess(&pconfig, t)
|
|
|
|
|
|
|
|
outputLs := string(stdout.Bytes())
|
|
|
|
|
|
|
|
// Check that the ls output has the expected file touched by the prestart hook
|
2015-09-11 09:15:00 +08:00
|
|
|
if !strings.Contains(outputLs, "/test") {
|
2015-09-12 01:28:25 +08:00
|
|
|
container.Destroy()
|
|
|
|
t.Fatalf("ls output doesn't have the expected file: %s", outputLs)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := container.Destroy(); err != nil {
|
|
|
|
t.Fatalf("container destory %s", err)
|
|
|
|
}
|
|
|
|
fi, err := os.Stat(filepath.Join(rootfs, "test"))
|
|
|
|
if err == nil || !os.IsNotExist(err) {
|
|
|
|
t.Fatalf("expected file to not exist, got %s", fi.Name())
|
2015-08-06 06:26:29 +08:00
|
|
|
}
|
|
|
|
}
|
2015-09-19 04:55:49 +08:00
|
|
|
|
|
|
|
func TestSTDIOPermissions(t *testing.T) {
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
rootfs, err := newRootfs()
|
|
|
|
ok(t, err)
|
|
|
|
defer remove(rootfs)
|
|
|
|
config := newTemplateConfig(rootfs)
|
|
|
|
buffers, exitCode, err := runContainer(config, "", "sh", "-c", "echo hi > /dev/stderr")
|
|
|
|
ok(t, err)
|
|
|
|
if exitCode != 0 {
|
|
|
|
t.Fatalf("exit code not 0. code %d stderr %q", exitCode, buffers.Stderr)
|
|
|
|
}
|
|
|
|
|
|
|
|
if actual := strings.Trim(buffers.Stderr.String(), "\n"); actual != "hi" {
|
|
|
|
t.Fatalf("stderr should equal be equal %q %q", actual, "hi")
|
|
|
|
}
|
|
|
|
}
|
2015-10-02 05:03:02 +08:00
|
|
|
|
|
|
|
func unmountOp(path string) error {
|
|
|
|
if err := syscall.Unmount(path, syscall.MNT_DETACH); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Launch container with rootfsPropagation in rslave mode. Also
|
|
|
|
// bind mount a volume /mnt1host at /mnt1cont at the time of launch. Now do
|
|
|
|
// another mount on host (/mnt1host/mnt2host) and this new mount should
|
|
|
|
// propagate to container (/mnt1cont/mnt2host)
|
|
|
|
func TestRootfsPropagationSlaveMount(t *testing.T) {
|
|
|
|
var mountPropagated bool
|
|
|
|
var dir1cont string
|
|
|
|
var dir2cont string
|
|
|
|
|
|
|
|
dir1cont = "/root/mnt1cont"
|
|
|
|
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
rootfs, err := newRootfs()
|
|
|
|
ok(t, err)
|
|
|
|
defer remove(rootfs)
|
|
|
|
config := newTemplateConfig(rootfs)
|
|
|
|
|
|
|
|
config.RootPropagation = syscall.MS_SLAVE | syscall.MS_REC
|
|
|
|
|
|
|
|
// Bind mount a volume
|
|
|
|
dir1host, err := ioutil.TempDir("", "mnt1host")
|
|
|
|
ok(t, err)
|
|
|
|
defer os.RemoveAll(dir1host)
|
|
|
|
|
|
|
|
// Make this dir a "shared" mount point. This will make sure a
|
2015-10-02 05:03:02 +08:00
|
|
|
// slave relationship can be established in container.
|
2015-10-02 05:03:02 +08:00
|
|
|
err = syscall.Mount(dir1host, dir1host, "bind", syscall.MS_BIND|syscall.MS_REC, "")
|
|
|
|
ok(t, err)
|
|
|
|
err = syscall.Mount("", dir1host, "", syscall.MS_SHARED|syscall.MS_REC, "")
|
|
|
|
ok(t, err)
|
|
|
|
defer unmountOp(dir1host)
|
|
|
|
|
|
|
|
config.Mounts = append(config.Mounts, &configs.Mount{
|
|
|
|
Source: dir1host,
|
|
|
|
Destination: dir1cont,
|
|
|
|
Device: "bind",
|
|
|
|
Flags: syscall.MS_BIND | syscall.MS_REC})
|
|
|
|
|
|
|
|
// TODO: systemd specific processing
|
|
|
|
f := factory
|
|
|
|
|
|
|
|
container, err := f.Create("testSlaveMount", config)
|
|
|
|
ok(t, err)
|
|
|
|
defer container.Destroy()
|
|
|
|
|
|
|
|
stdinR, stdinW, err := os.Pipe()
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
pconfig := &libcontainer.Process{
|
2016-01-15 07:21:36 +08:00
|
|
|
Cwd: "/",
|
2015-10-02 05:03:02 +08:00
|
|
|
Args: []string{"cat"},
|
|
|
|
Env: standardEnvironment,
|
|
|
|
Stdin: stdinR,
|
|
|
|
}
|
|
|
|
|
|
|
|
err = container.Start(pconfig)
|
|
|
|
stdinR.Close()
|
|
|
|
defer stdinW.Close()
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
// Create mnt1host/mnt2host and bind mount itself on top of it. This
|
|
|
|
// should be visible in container.
|
|
|
|
dir2host, err := ioutil.TempDir(dir1host, "mnt2host")
|
|
|
|
ok(t, err)
|
|
|
|
defer os.RemoveAll(dir2host)
|
|
|
|
|
|
|
|
err = syscall.Mount(dir2host, dir2host, "bind", syscall.MS_BIND, "")
|
|
|
|
defer unmountOp(dir2host)
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
// Run "cat /proc/self/mountinfo" in container and look at mount points.
|
|
|
|
var stdout2 bytes.Buffer
|
|
|
|
|
|
|
|
stdinR2, stdinW2, err := os.Pipe()
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
pconfig2 := &libcontainer.Process{
|
2016-01-15 07:21:36 +08:00
|
|
|
Cwd: "/",
|
2015-10-02 05:03:02 +08:00
|
|
|
Args: []string{"cat", "/proc/self/mountinfo"},
|
|
|
|
Env: standardEnvironment,
|
|
|
|
Stdin: stdinR2,
|
|
|
|
Stdout: &stdout2,
|
|
|
|
}
|
|
|
|
|
|
|
|
err = container.Start(pconfig2)
|
|
|
|
stdinR2.Close()
|
|
|
|
defer stdinW2.Close()
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
stdinW2.Close()
|
|
|
|
waitProcess(pconfig2, t)
|
|
|
|
stdinW.Close()
|
|
|
|
waitProcess(pconfig, t)
|
|
|
|
|
|
|
|
mountPropagated = false
|
|
|
|
dir2cont = filepath.Join(dir1cont, filepath.Base(dir2host))
|
|
|
|
|
|
|
|
propagationInfo := string(stdout2.Bytes())
|
|
|
|
lines := strings.Split(propagationInfo, "\n")
|
|
|
|
for _, l := range lines {
|
|
|
|
linefields := strings.Split(l, " ")
|
|
|
|
if len(linefields) < 5 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if linefields[4] == dir2cont {
|
|
|
|
mountPropagated = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if mountPropagated != true {
|
|
|
|
t.Fatalf("Mount on host %s did not propagate in container at %s\n", dir2host, dir2cont)
|
|
|
|
}
|
|
|
|
}
|
2015-10-02 05:03:02 +08:00
|
|
|
|
|
|
|
// Launch container with rootfsPropagation 0 so no propagation flags are
|
|
|
|
// applied. Also bind mount a volume /mnt1host at /mnt1cont at the time of
|
|
|
|
// launch. Now do a mount in container (/mnt1cont/mnt2cont) and this new
|
|
|
|
// mount should propagate to host (/mnt1host/mnt2cont)
|
|
|
|
|
|
|
|
func TestRootfsPropagationSharedMount(t *testing.T) {
|
|
|
|
var dir1cont string
|
|
|
|
var dir2cont string
|
|
|
|
|
|
|
|
dir1cont = "/root/mnt1cont"
|
|
|
|
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
rootfs, err := newRootfs()
|
|
|
|
ok(t, err)
|
|
|
|
defer remove(rootfs)
|
|
|
|
config := newTemplateConfig(rootfs)
|
|
|
|
config.RootPropagation = syscall.MS_PRIVATE
|
|
|
|
|
|
|
|
// Bind mount a volume
|
|
|
|
dir1host, err := ioutil.TempDir("", "mnt1host")
|
|
|
|
ok(t, err)
|
|
|
|
defer os.RemoveAll(dir1host)
|
|
|
|
|
|
|
|
// Make this dir a "shared" mount point. This will make sure a
|
|
|
|
// shared relationship can be established in container.
|
|
|
|
err = syscall.Mount(dir1host, dir1host, "bind", syscall.MS_BIND|syscall.MS_REC, "")
|
|
|
|
ok(t, err)
|
|
|
|
err = syscall.Mount("", dir1host, "", syscall.MS_SHARED|syscall.MS_REC, "")
|
|
|
|
ok(t, err)
|
|
|
|
defer unmountOp(dir1host)
|
|
|
|
|
|
|
|
config.Mounts = append(config.Mounts, &configs.Mount{
|
|
|
|
Source: dir1host,
|
|
|
|
Destination: dir1cont,
|
|
|
|
Device: "bind",
|
|
|
|
Flags: syscall.MS_BIND | syscall.MS_REC})
|
|
|
|
|
|
|
|
// TODO: systemd specific processing
|
|
|
|
f := factory
|
|
|
|
|
|
|
|
container, err := f.Create("testSharedMount", config)
|
|
|
|
ok(t, err)
|
|
|
|
defer container.Destroy()
|
|
|
|
|
|
|
|
stdinR, stdinW, err := os.Pipe()
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
pconfig := &libcontainer.Process{
|
2016-01-15 07:21:36 +08:00
|
|
|
Cwd: "/",
|
2015-10-02 05:03:02 +08:00
|
|
|
Args: []string{"cat"},
|
|
|
|
Env: standardEnvironment,
|
|
|
|
Stdin: stdinR,
|
|
|
|
}
|
|
|
|
|
|
|
|
err = container.Start(pconfig)
|
|
|
|
stdinR.Close()
|
|
|
|
defer stdinW.Close()
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
// Create mnt1host/mnt2cont. This will become visible inside container
|
|
|
|
// at mnt1cont/mnt2cont. Bind mount itself on top of it. This
|
|
|
|
// should be visible on host now.
|
|
|
|
dir2host, err := ioutil.TempDir(dir1host, "mnt2cont")
|
|
|
|
ok(t, err)
|
|
|
|
defer os.RemoveAll(dir2host)
|
|
|
|
|
|
|
|
dir2cont = filepath.Join(dir1cont, filepath.Base(dir2host))
|
|
|
|
|
|
|
|
// Mount something in container and see if it is visible on host.
|
|
|
|
var stdout2 bytes.Buffer
|
|
|
|
|
|
|
|
stdinR2, stdinW2, err := os.Pipe()
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
// Provide CAP_SYS_ADMIN
|
|
|
|
processCaps := append(config.Capabilities, "CAP_SYS_ADMIN")
|
|
|
|
|
|
|
|
pconfig2 := &libcontainer.Process{
|
2016-01-15 07:21:36 +08:00
|
|
|
Cwd: "/",
|
2015-10-02 05:03:02 +08:00
|
|
|
Args: []string{"mount", "--bind", dir2cont, dir2cont},
|
|
|
|
Env: standardEnvironment,
|
|
|
|
Stdin: stdinR2,
|
|
|
|
Stdout: &stdout2,
|
|
|
|
Capabilities: processCaps,
|
|
|
|
}
|
|
|
|
|
|
|
|
err = container.Start(pconfig2)
|
|
|
|
stdinR2.Close()
|
|
|
|
defer stdinW2.Close()
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
// Wait for process
|
|
|
|
stdinW2.Close()
|
|
|
|
waitProcess(pconfig2, t)
|
|
|
|
stdinW.Close()
|
|
|
|
waitProcess(pconfig, t)
|
|
|
|
|
|
|
|
defer unmountOp(dir2host)
|
|
|
|
|
|
|
|
// Check if mount is visible on host or not.
|
|
|
|
out, err := exec.Command("findmnt", "-n", "-f", "-oTARGET", dir2host).CombinedOutput()
|
|
|
|
outtrim := strings.TrimSpace(string(out))
|
|
|
|
if err != nil {
|
|
|
|
t.Logf("findmnt error %q: %q", err, outtrim)
|
|
|
|
}
|
|
|
|
|
|
|
|
if string(outtrim) != dir2host {
|
|
|
|
t.Fatalf("Mount in container on %s did not propagate to host on %s. finmnt output=%s", dir2cont, dir2host, outtrim)
|
|
|
|
}
|
|
|
|
}
|
2015-10-14 04:57:30 +08:00
|
|
|
|
|
|
|
func TestPIDHost(t *testing.T) {
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
rootfs, err := newRootfs()
|
|
|
|
ok(t, err)
|
|
|
|
defer remove(rootfs)
|
|
|
|
|
|
|
|
l, err := os.Readlink("/proc/1/ns/pid")
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
config := newTemplateConfig(rootfs)
|
|
|
|
config.Namespaces.Remove(configs.NEWPID)
|
|
|
|
buffers, exitCode, err := runContainer(config, "", "readlink", "/proc/self/ns/pid")
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
if exitCode != 0 {
|
|
|
|
t.Fatalf("exit code not 0. code %d stderr %q", exitCode, buffers.Stderr)
|
|
|
|
}
|
|
|
|
|
|
|
|
if actual := strings.Trim(buffers.Stdout.String(), "\n"); actual != l {
|
|
|
|
t.Fatalf("ipc link not equal to host link %q %q", actual, l)
|
|
|
|
}
|
|
|
|
}
|
2015-09-14 08:35:22 +08:00
|
|
|
|
|
|
|
func TestInitJoinPID(t *testing.T) {
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
rootfs, err := newRootfs()
|
|
|
|
ok(t, err)
|
|
|
|
defer remove(rootfs)
|
|
|
|
|
|
|
|
// Execute a long-running container
|
|
|
|
container1, err := newContainer(newTemplateConfig(rootfs))
|
|
|
|
ok(t, err)
|
|
|
|
defer container1.Destroy()
|
|
|
|
|
|
|
|
stdinR1, stdinW1, err := os.Pipe()
|
|
|
|
ok(t, err)
|
|
|
|
init1 := &libcontainer.Process{
|
|
|
|
Cwd: "/",
|
|
|
|
Args: []string{"cat"},
|
|
|
|
Env: standardEnvironment,
|
|
|
|
Stdin: stdinR1,
|
|
|
|
}
|
|
|
|
err = container1.Start(init1)
|
|
|
|
stdinR1.Close()
|
|
|
|
defer stdinW1.Close()
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
// get the state of the first container
|
|
|
|
state1, err := container1.State()
|
|
|
|
ok(t, err)
|
|
|
|
pidns1 := state1.NamespacePaths[configs.NEWPID]
|
|
|
|
|
|
|
|
// Start a container inside the existing pidns but with different cgroups
|
|
|
|
config2 := newTemplateConfig(rootfs)
|
|
|
|
config2.Namespaces.Add(configs.NEWPID, pidns1)
|
|
|
|
config2.Cgroups.Path = "integration/test2"
|
|
|
|
container2, err := newContainerWithName("testCT2", config2)
|
|
|
|
ok(t, err)
|
|
|
|
defer container2.Destroy()
|
|
|
|
|
|
|
|
stdinR2, stdinW2, err := os.Pipe()
|
|
|
|
ok(t, err)
|
|
|
|
init2 := &libcontainer.Process{
|
|
|
|
Cwd: "/",
|
|
|
|
Args: []string{"cat"},
|
|
|
|
Env: standardEnvironment,
|
|
|
|
Stdin: stdinR2,
|
|
|
|
}
|
|
|
|
err = container2.Start(init2)
|
|
|
|
stdinR2.Close()
|
|
|
|
defer stdinW2.Close()
|
|
|
|
ok(t, err)
|
|
|
|
// get the state of the second container
|
|
|
|
state2, err := container2.State()
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
ns1, err := os.Readlink(fmt.Sprintf("/proc/%d/ns/pid", state1.InitProcessPid))
|
|
|
|
ok(t, err)
|
|
|
|
ns2, err := os.Readlink(fmt.Sprintf("/proc/%d/ns/pid", state2.InitProcessPid))
|
|
|
|
ok(t, err)
|
|
|
|
if ns1 != ns2 {
|
|
|
|
t.Errorf("pidns(%s), wanted %s", ns2, ns1)
|
|
|
|
}
|
|
|
|
|
|
|
|
// check that namespaces are not the same
|
|
|
|
if reflect.DeepEqual(state2.NamespacePaths, state1.NamespacePaths) {
|
|
|
|
t.Errorf("Namespaces(%v), original %v", state2.NamespacePaths,
|
|
|
|
state1.NamespacePaths)
|
|
|
|
}
|
|
|
|
// check that pidns is joined correctly. The initial container process list
|
|
|
|
// should contain the second container's init process
|
|
|
|
buffers := newStdBuffers()
|
|
|
|
ps := &libcontainer.Process{
|
|
|
|
Cwd: "/",
|
|
|
|
Args: []string{"ps"},
|
|
|
|
Env: standardEnvironment,
|
|
|
|
Stdout: buffers.Stdout,
|
|
|
|
}
|
|
|
|
err = container1.Start(ps)
|
|
|
|
ok(t, err)
|
|
|
|
waitProcess(ps, t)
|
|
|
|
|
|
|
|
// Stop init processes one by one. Stop the second container should
|
|
|
|
// not stop the first.
|
|
|
|
stdinW2.Close()
|
|
|
|
waitProcess(init2, t)
|
|
|
|
stdinW1.Close()
|
|
|
|
waitProcess(init1, t)
|
|
|
|
|
|
|
|
out := strings.TrimSpace(buffers.Stdout.String())
|
|
|
|
// output of ps inside the initial PID namespace should have
|
|
|
|
// 1 line of header,
|
|
|
|
// 2 lines of init processes,
|
|
|
|
// 1 line of ps process
|
|
|
|
if len(strings.Split(out, "\n")) != 4 {
|
|
|
|
t.Errorf("unexpected running process, output %q", out)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestInitJoinNetworkAndUser(t *testing.T) {
|
|
|
|
if _, err := os.Stat("/proc/self/ns/user"); os.IsNotExist(err) {
|
|
|
|
t.Skip("userns is unsupported")
|
|
|
|
}
|
|
|
|
if testing.Short() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
rootfs, err := newRootfs()
|
|
|
|
ok(t, err)
|
|
|
|
defer remove(rootfs)
|
|
|
|
|
|
|
|
// Execute a long-running container
|
|
|
|
config1 := newTemplateConfig(rootfs)
|
|
|
|
config1.UidMappings = []configs.IDMap{{0, 0, 1000}}
|
|
|
|
config1.GidMappings = []configs.IDMap{{0, 0, 1000}}
|
|
|
|
config1.Namespaces = append(config1.Namespaces, configs.Namespace{Type: configs.NEWUSER})
|
|
|
|
container1, err := newContainer(config1)
|
|
|
|
ok(t, err)
|
|
|
|
defer container1.Destroy()
|
|
|
|
|
|
|
|
stdinR1, stdinW1, err := os.Pipe()
|
|
|
|
ok(t, err)
|
|
|
|
init1 := &libcontainer.Process{
|
|
|
|
Cwd: "/",
|
|
|
|
Args: []string{"cat"},
|
|
|
|
Env: standardEnvironment,
|
|
|
|
Stdin: stdinR1,
|
|
|
|
}
|
|
|
|
err = container1.Start(init1)
|
|
|
|
stdinR1.Close()
|
|
|
|
defer stdinW1.Close()
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
// get the state of the first container
|
|
|
|
state1, err := container1.State()
|
|
|
|
ok(t, err)
|
|
|
|
netns1 := state1.NamespacePaths[configs.NEWNET]
|
|
|
|
userns1 := state1.NamespacePaths[configs.NEWUSER]
|
|
|
|
|
|
|
|
// Start a container inside the existing pidns but with different cgroups
|
|
|
|
rootfs2, err := newRootfs()
|
|
|
|
ok(t, err)
|
|
|
|
defer remove(rootfs2)
|
|
|
|
|
|
|
|
config2 := newTemplateConfig(rootfs2)
|
|
|
|
config2.UidMappings = []configs.IDMap{{0, 0, 1000}}
|
|
|
|
config2.GidMappings = []configs.IDMap{{0, 0, 1000}}
|
|
|
|
config2.Namespaces.Add(configs.NEWNET, netns1)
|
|
|
|
config2.Namespaces.Add(configs.NEWUSER, userns1)
|
|
|
|
config2.Cgroups.Path = "integration/test2"
|
|
|
|
container2, err := newContainerWithName("testCT2", config2)
|
|
|
|
ok(t, err)
|
|
|
|
defer container2.Destroy()
|
|
|
|
|
|
|
|
stdinR2, stdinW2, err := os.Pipe()
|
|
|
|
ok(t, err)
|
|
|
|
init2 := &libcontainer.Process{
|
|
|
|
Cwd: "/",
|
|
|
|
Args: []string{"cat"},
|
|
|
|
Env: standardEnvironment,
|
|
|
|
Stdin: stdinR2,
|
|
|
|
}
|
|
|
|
err = container2.Start(init2)
|
|
|
|
stdinR2.Close()
|
|
|
|
defer stdinW2.Close()
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
// get the state of the second container
|
|
|
|
state2, err := container2.State()
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
for _, ns := range []string{"net", "user"} {
|
|
|
|
ns1, err := os.Readlink(fmt.Sprintf("/proc/%d/ns/%s", state1.InitProcessPid, ns))
|
|
|
|
ok(t, err)
|
|
|
|
ns2, err := os.Readlink(fmt.Sprintf("/proc/%d/ns/%s", state2.InitProcessPid, ns))
|
|
|
|
ok(t, err)
|
|
|
|
if ns1 != ns2 {
|
|
|
|
t.Errorf("%s(%s), wanted %s", ns, ns2, ns1)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// check that namespaces are not the same
|
|
|
|
if reflect.DeepEqual(state2.NamespacePaths, state1.NamespacePaths) {
|
|
|
|
t.Errorf("Namespaces(%v), original %v", state2.NamespacePaths,
|
|
|
|
state1.NamespacePaths)
|
|
|
|
}
|
|
|
|
// Stop init processes one by one. Stop the second container should
|
|
|
|
// not stop the first.
|
|
|
|
stdinW2.Close()
|
|
|
|
waitProcess(init2, t)
|
|
|
|
stdinW1.Close()
|
|
|
|
waitProcess(init1, t)
|
|
|
|
}
|