archive_linux_test.go 5.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164
  1. package archive // import "github.com/docker/docker/pkg/archive"
  2. import (
  3. "io/ioutil"
  4. "os"
  5. "path/filepath"
  6. "syscall"
  7. "testing"
  8. "github.com/docker/docker/pkg/system"
  9. rsystem "github.com/opencontainers/runc/libcontainer/system"
  10. "golang.org/x/sys/unix"
  11. "gotest.tools/assert"
  12. "gotest.tools/skip"
  13. )
  14. // setupOverlayTestDir creates files in a directory with overlay whiteouts
  15. // Tree layout
  16. // .
  17. // ├── d1 # opaque, 0700
  18. // │   └── f1 # empty file, 0600
  19. // ├── d2 # opaque, 0750
  20. // │   └── f1 # empty file, 0660
  21. // └── d3 # 0700
  22. // └── f1 # whiteout, 0644
  23. func setupOverlayTestDir(t *testing.T, src string) {
  24. skip.If(t, os.Getuid() != 0, "skipping test that requires root")
  25. skip.If(t, rsystem.RunningInUserNS(), "skipping test that requires initial userns (trusted.overlay.opaque xattr cannot be set in userns, even with Ubuntu kernel)")
  26. // Create opaque directory containing single file and permission 0700
  27. err := os.Mkdir(filepath.Join(src, "d1"), 0700)
  28. assert.NilError(t, err)
  29. err = system.Lsetxattr(filepath.Join(src, "d1"), "trusted.overlay.opaque", []byte("y"), 0)
  30. assert.NilError(t, err)
  31. err = ioutil.WriteFile(filepath.Join(src, "d1", "f1"), []byte{}, 0600)
  32. assert.NilError(t, err)
  33. // Create another opaque directory containing single file but with permission 0750
  34. err = os.Mkdir(filepath.Join(src, "d2"), 0750)
  35. assert.NilError(t, err)
  36. err = system.Lsetxattr(filepath.Join(src, "d2"), "trusted.overlay.opaque", []byte("y"), 0)
  37. assert.NilError(t, err)
  38. err = ioutil.WriteFile(filepath.Join(src, "d2", "f1"), []byte{}, 0660)
  39. assert.NilError(t, err)
  40. // Create regular directory with deleted file
  41. err = os.Mkdir(filepath.Join(src, "d3"), 0700)
  42. assert.NilError(t, err)
  43. err = system.Mknod(filepath.Join(src, "d3", "f1"), unix.S_IFCHR, 0)
  44. assert.NilError(t, err)
  45. }
  46. func checkOpaqueness(t *testing.T, path string, opaque string) {
  47. xattrOpaque, err := system.Lgetxattr(path, "trusted.overlay.opaque")
  48. assert.NilError(t, err)
  49. if string(xattrOpaque) != opaque {
  50. t.Fatalf("Unexpected opaque value: %q, expected %q", string(xattrOpaque), opaque)
  51. }
  52. }
  53. func checkOverlayWhiteout(t *testing.T, path string) {
  54. stat, err := os.Stat(path)
  55. assert.NilError(t, err)
  56. statT, ok := stat.Sys().(*syscall.Stat_t)
  57. if !ok {
  58. t.Fatalf("Unexpected type: %t, expected *syscall.Stat_t", stat.Sys())
  59. }
  60. if statT.Rdev != 0 {
  61. t.Fatalf("Non-zero device number for whiteout")
  62. }
  63. }
  64. func checkFileMode(t *testing.T, path string, perm os.FileMode) {
  65. stat, err := os.Stat(path)
  66. assert.NilError(t, err)
  67. if stat.Mode() != perm {
  68. t.Fatalf("Unexpected file mode for %s: %o, expected %o", path, stat.Mode(), perm)
  69. }
  70. }
  71. func TestOverlayTarUntar(t *testing.T) {
  72. oldmask, err := system.Umask(0)
  73. assert.NilError(t, err)
  74. defer system.Umask(oldmask)
  75. src, err := ioutil.TempDir("", "docker-test-overlay-tar-src")
  76. assert.NilError(t, err)
  77. defer os.RemoveAll(src)
  78. setupOverlayTestDir(t, src)
  79. dst, err := ioutil.TempDir("", "docker-test-overlay-tar-dst")
  80. assert.NilError(t, err)
  81. defer os.RemoveAll(dst)
  82. options := &TarOptions{
  83. Compression: Uncompressed,
  84. WhiteoutFormat: OverlayWhiteoutFormat,
  85. }
  86. archive, err := TarWithOptions(src, options)
  87. assert.NilError(t, err)
  88. defer archive.Close()
  89. err = Untar(archive, dst, options)
  90. assert.NilError(t, err)
  91. checkFileMode(t, filepath.Join(dst, "d1"), 0700|os.ModeDir)
  92. checkFileMode(t, filepath.Join(dst, "d2"), 0750|os.ModeDir)
  93. checkFileMode(t, filepath.Join(dst, "d3"), 0700|os.ModeDir)
  94. checkFileMode(t, filepath.Join(dst, "d1", "f1"), 0600)
  95. checkFileMode(t, filepath.Join(dst, "d2", "f1"), 0660)
  96. checkFileMode(t, filepath.Join(dst, "d3", "f1"), os.ModeCharDevice|os.ModeDevice)
  97. checkOpaqueness(t, filepath.Join(dst, "d1"), "y")
  98. checkOpaqueness(t, filepath.Join(dst, "d2"), "y")
  99. checkOpaqueness(t, filepath.Join(dst, "d3"), "")
  100. checkOverlayWhiteout(t, filepath.Join(dst, "d3", "f1"))
  101. }
  102. func TestOverlayTarAUFSUntar(t *testing.T) {
  103. oldmask, err := system.Umask(0)
  104. assert.NilError(t, err)
  105. defer system.Umask(oldmask)
  106. src, err := ioutil.TempDir("", "docker-test-overlay-tar-src")
  107. assert.NilError(t, err)
  108. defer os.RemoveAll(src)
  109. setupOverlayTestDir(t, src)
  110. dst, err := ioutil.TempDir("", "docker-test-overlay-tar-dst")
  111. assert.NilError(t, err)
  112. defer os.RemoveAll(dst)
  113. archive, err := TarWithOptions(src, &TarOptions{
  114. Compression: Uncompressed,
  115. WhiteoutFormat: OverlayWhiteoutFormat,
  116. })
  117. assert.NilError(t, err)
  118. defer archive.Close()
  119. err = Untar(archive, dst, &TarOptions{
  120. Compression: Uncompressed,
  121. WhiteoutFormat: AUFSWhiteoutFormat,
  122. })
  123. assert.NilError(t, err)
  124. checkFileMode(t, filepath.Join(dst, "d1"), 0700|os.ModeDir)
  125. checkFileMode(t, filepath.Join(dst, "d1", WhiteoutOpaqueDir), 0700)
  126. checkFileMode(t, filepath.Join(dst, "d2"), 0750|os.ModeDir)
  127. checkFileMode(t, filepath.Join(dst, "d2", WhiteoutOpaqueDir), 0750)
  128. checkFileMode(t, filepath.Join(dst, "d3"), 0700|os.ModeDir)
  129. checkFileMode(t, filepath.Join(dst, "d1", "f1"), 0600)
  130. checkFileMode(t, filepath.Join(dst, "d2", "f1"), 0660)
  131. checkFileMode(t, filepath.Join(dst, "d3", WhiteoutPrefix+"f1"), 0600)
  132. }