oci_linux_test.go 6.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202
  1. package daemon // import "github.com/docker/docker/daemon"
  2. import (
  3. "os"
  4. "path/filepath"
  5. "testing"
  6. containertypes "github.com/docker/docker/api/types/container"
  7. "github.com/docker/docker/container"
  8. "github.com/docker/docker/daemon/config"
  9. "github.com/docker/docker/daemon/network"
  10. "github.com/docker/docker/libnetwork"
  11. "github.com/docker/docker/pkg/containerfs"
  12. "gotest.tools/v3/assert"
  13. is "gotest.tools/v3/assert/cmp"
  14. "gotest.tools/v3/skip"
  15. )
  16. func setupFakeDaemon(t *testing.T, c *container.Container) *Daemon {
  17. root, err := os.MkdirTemp("", "oci_linux_test-root")
  18. assert.NilError(t, err)
  19. rootfs := filepath.Join(root, "rootfs")
  20. err = os.MkdirAll(rootfs, 0755)
  21. assert.NilError(t, err)
  22. netController, err := libnetwork.New()
  23. assert.NilError(t, err)
  24. d := &Daemon{
  25. // some empty structs to avoid getting a panic
  26. // caused by a null pointer dereference
  27. configStore: &config.Config{},
  28. linkIndex: newLinkIndex(),
  29. netController: netController,
  30. }
  31. c.Root = root
  32. c.BaseFS = containerfs.NewLocalContainerFS(rootfs)
  33. if c.Config == nil {
  34. c.Config = new(containertypes.Config)
  35. }
  36. if c.HostConfig == nil {
  37. c.HostConfig = new(containertypes.HostConfig)
  38. }
  39. if c.NetworkSettings == nil {
  40. c.NetworkSettings = &network.Settings{Networks: make(map[string]*network.EndpointSettings)}
  41. }
  42. return d
  43. }
  44. func cleanupFakeContainer(c *container.Container) {
  45. _ = os.RemoveAll(c.Root)
  46. }
  47. // TestTmpfsDevShmNoDupMount checks that a user-specified /dev/shm tmpfs
  48. // mount (as in "docker run --tmpfs /dev/shm:rw,size=NNN") does not result
  49. // in "Duplicate mount point" error from the engine.
  50. // https://github.com/moby/moby/issues/35455
  51. func TestTmpfsDevShmNoDupMount(t *testing.T) {
  52. skip.If(t, os.Getuid() != 0, "skipping test that requires root")
  53. c := &container.Container{
  54. ShmPath: "foobar", // non-empty, for c.IpcMounts() to work
  55. HostConfig: &containertypes.HostConfig{
  56. IpcMode: containertypes.IPCModeShareable, // default mode
  57. // --tmpfs /dev/shm:rw,exec,size=NNN
  58. Tmpfs: map[string]string{
  59. "/dev/shm": "rw,exec,size=1g",
  60. },
  61. },
  62. }
  63. d := setupFakeDaemon(t, c)
  64. defer cleanupFakeContainer(c)
  65. _, err := d.createSpec(c)
  66. assert.Check(t, err)
  67. }
  68. // TestIpcPrivateVsReadonly checks that in case of IpcMode: private
  69. // and ReadonlyRootfs: true (as in "docker run --ipc private --read-only")
  70. // the resulting /dev/shm mount is NOT made read-only.
  71. // https://github.com/moby/moby/issues/36503
  72. func TestIpcPrivateVsReadonly(t *testing.T) {
  73. skip.If(t, os.Getuid() != 0, "skipping test that requires root")
  74. c := &container.Container{
  75. HostConfig: &containertypes.HostConfig{
  76. IpcMode: containertypes.IPCModePrivate,
  77. ReadonlyRootfs: true,
  78. },
  79. }
  80. d := setupFakeDaemon(t, c)
  81. defer cleanupFakeContainer(c)
  82. s, err := d.createSpec(c)
  83. assert.Check(t, err)
  84. // Find the /dev/shm mount in ms, check it does not have ro
  85. for _, m := range s.Mounts {
  86. if m.Destination != "/dev/shm" {
  87. continue
  88. }
  89. assert.Check(t, is.Equal(false, inSlice(m.Options, "ro")))
  90. }
  91. }
  92. // TestSysctlOverride ensures that any implicit sysctls (such as
  93. // Config.Domainname) are overridden by an explicit sysctl in the HostConfig.
  94. func TestSysctlOverride(t *testing.T) {
  95. skip.If(t, os.Getuid() != 0, "skipping test that requires root")
  96. c := &container.Container{
  97. Config: &containertypes.Config{
  98. Hostname: "foobar",
  99. Domainname: "baz.cyphar.com",
  100. },
  101. HostConfig: &containertypes.HostConfig{
  102. NetworkMode: "bridge",
  103. Sysctls: map[string]string{},
  104. },
  105. }
  106. d := setupFakeDaemon(t, c)
  107. defer cleanupFakeContainer(c)
  108. // Ensure that the implicit sysctl is set correctly.
  109. s, err := d.createSpec(c)
  110. assert.NilError(t, err)
  111. assert.Equal(t, s.Hostname, "foobar")
  112. assert.Equal(t, s.Linux.Sysctl["kernel.domainname"], c.Config.Domainname)
  113. if sysctlExists("net.ipv4.ip_unprivileged_port_start") {
  114. assert.Equal(t, s.Linux.Sysctl["net.ipv4.ip_unprivileged_port_start"], "0")
  115. }
  116. if sysctlExists("net.ipv4.ping_group_range") {
  117. assert.Equal(t, s.Linux.Sysctl["net.ipv4.ping_group_range"], "0 2147483647")
  118. }
  119. // Set an explicit sysctl.
  120. c.HostConfig.Sysctls["kernel.domainname"] = "foobar.net"
  121. assert.Assert(t, c.HostConfig.Sysctls["kernel.domainname"] != c.Config.Domainname)
  122. c.HostConfig.Sysctls["net.ipv4.ip_unprivileged_port_start"] = "1024"
  123. s, err = d.createSpec(c)
  124. assert.NilError(t, err)
  125. assert.Equal(t, s.Hostname, "foobar")
  126. assert.Equal(t, s.Linux.Sysctl["kernel.domainname"], c.HostConfig.Sysctls["kernel.domainname"])
  127. assert.Equal(t, s.Linux.Sysctl["net.ipv4.ip_unprivileged_port_start"], c.HostConfig.Sysctls["net.ipv4.ip_unprivileged_port_start"])
  128. // Ensure the ping_group_range is not set on a daemon with user-namespaces enabled
  129. d.configStore.RemappedRoot = "dummy:dummy"
  130. s, err = d.createSpec(c)
  131. assert.NilError(t, err)
  132. _, ok := s.Linux.Sysctl["net.ipv4.ping_group_range"]
  133. assert.Assert(t, !ok)
  134. // Ensure the ping_group_range is set on a container in "host" userns mode
  135. // on a daemon with user-namespaces enabled
  136. c.HostConfig.UsernsMode = "host"
  137. s, err = d.createSpec(c)
  138. assert.NilError(t, err)
  139. assert.Equal(t, s.Linux.Sysctl["net.ipv4.ping_group_range"], "0 2147483647")
  140. }
  141. // TestSysctlOverrideHost ensures that any implicit network sysctls are not set
  142. // with host networking
  143. func TestSysctlOverrideHost(t *testing.T) {
  144. skip.If(t, os.Getuid() != 0, "skipping test that requires root")
  145. c := &container.Container{
  146. Config: &containertypes.Config{},
  147. HostConfig: &containertypes.HostConfig{
  148. NetworkMode: "host",
  149. Sysctls: map[string]string{},
  150. },
  151. }
  152. d := setupFakeDaemon(t, c)
  153. defer cleanupFakeContainer(c)
  154. // Ensure that the implicit sysctl is not set
  155. s, err := d.createSpec(c)
  156. assert.NilError(t, err)
  157. assert.Equal(t, s.Linux.Sysctl["net.ipv4.ip_unprivileged_port_start"], "")
  158. assert.Equal(t, s.Linux.Sysctl["net.ipv4.ping_group_range"], "")
  159. // Set an explicit sysctl.
  160. c.HostConfig.Sysctls["net.ipv4.ip_unprivileged_port_start"] = "1024"
  161. s, err = d.createSpec(c)
  162. assert.NilError(t, err)
  163. assert.Equal(t, s.Linux.Sysctl["net.ipv4.ip_unprivileged_port_start"], c.HostConfig.Sysctls["net.ipv4.ip_unprivileged_port_start"])
  164. }
  165. func TestGetSourceMount(t *testing.T) {
  166. // must be able to find source mount for /
  167. mnt, _, err := getSourceMount("/")
  168. assert.NilError(t, err)
  169. assert.Equal(t, mnt, "/")
  170. // must be able to find source mount for current directory
  171. cwd, err := os.Getwd()
  172. assert.NilError(t, err)
  173. _, _, err = getSourceMount(cwd)
  174. assert.NilError(t, err)
  175. }