archive_unix_test.go 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263
  1. // +build !windows
  2. package archive
  3. import (
  4. "bytes"
  5. "fmt"
  6. "io/ioutil"
  7. "os"
  8. "path/filepath"
  9. "runtime"
  10. "syscall"
  11. "testing"
  12. "github.com/docker/docker/pkg/system"
  13. "github.com/stretchr/testify/assert"
  14. "github.com/stretchr/testify/require"
  15. "golang.org/x/sys/unix"
  16. )
  17. func TestCanonicalTarNameForPath(t *testing.T) {
  18. cases := []struct{ in, expected string }{
  19. {"foo", "foo"},
  20. {"foo/bar", "foo/bar"},
  21. {"foo/dir/", "foo/dir/"},
  22. }
  23. for _, v := range cases {
  24. if out, err := CanonicalTarNameForPath(v.in); err != nil {
  25. t.Fatalf("cannot get canonical name for path: %s: %v", v.in, err)
  26. } else if out != v.expected {
  27. t.Fatalf("wrong canonical tar name. expected:%s got:%s", v.expected, out)
  28. }
  29. }
  30. }
  31. func TestCanonicalTarName(t *testing.T) {
  32. cases := []struct {
  33. in string
  34. isDir bool
  35. expected string
  36. }{
  37. {"foo", false, "foo"},
  38. {"foo", true, "foo/"},
  39. {"foo/bar", false, "foo/bar"},
  40. {"foo/bar", true, "foo/bar/"},
  41. }
  42. for _, v := range cases {
  43. if out, err := canonicalTarName(v.in, v.isDir); err != nil {
  44. t.Fatalf("cannot get canonical name for path: %s: %v", v.in, err)
  45. } else if out != v.expected {
  46. t.Fatalf("wrong canonical tar name. expected:%s got:%s", v.expected, out)
  47. }
  48. }
  49. }
  50. func TestChmodTarEntry(t *testing.T) {
  51. cases := []struct {
  52. in, expected os.FileMode
  53. }{
  54. {0000, 0000},
  55. {0777, 0777},
  56. {0644, 0644},
  57. {0755, 0755},
  58. {0444, 0444},
  59. }
  60. for _, v := range cases {
  61. if out := chmodTarEntry(v.in); out != v.expected {
  62. t.Fatalf("wrong chmod. expected:%v got:%v", v.expected, out)
  63. }
  64. }
  65. }
  66. func TestTarWithHardLink(t *testing.T) {
  67. origin, err := ioutil.TempDir("", "docker-test-tar-hardlink")
  68. require.NoError(t, err)
  69. defer os.RemoveAll(origin)
  70. err = ioutil.WriteFile(filepath.Join(origin, "1"), []byte("hello world"), 0700)
  71. require.NoError(t, err)
  72. err = os.Link(filepath.Join(origin, "1"), filepath.Join(origin, "2"))
  73. require.NoError(t, err)
  74. var i1, i2 uint64
  75. i1, err = getNlink(filepath.Join(origin, "1"))
  76. require.NoError(t, err)
  77. // sanity check that we can hardlink
  78. if i1 != 2 {
  79. t.Skipf("skipping since hardlinks don't work here; expected 2 links, got %d", i1)
  80. }
  81. dest, err := ioutil.TempDir("", "docker-test-tar-hardlink-dest")
  82. require.NoError(t, err)
  83. defer os.RemoveAll(dest)
  84. // we'll do this in two steps to separate failure
  85. fh, err := Tar(origin, Uncompressed)
  86. require.NoError(t, err)
  87. // ensure we can read the whole thing with no error, before writing back out
  88. buf, err := ioutil.ReadAll(fh)
  89. require.NoError(t, err)
  90. bRdr := bytes.NewReader(buf)
  91. err = Untar(bRdr, dest, &TarOptions{Compression: Uncompressed})
  92. require.NoError(t, err)
  93. i1, err = getInode(filepath.Join(dest, "1"))
  94. require.NoError(t, err)
  95. i2, err = getInode(filepath.Join(dest, "2"))
  96. require.NoError(t, err)
  97. assert.Equal(t, i1, i2)
  98. }
  99. func TestTarWithHardLinkAndRebase(t *testing.T) {
  100. tmpDir, err := ioutil.TempDir("", "docker-test-tar-hardlink-rebase")
  101. require.NoError(t, err)
  102. defer os.RemoveAll(tmpDir)
  103. origin := filepath.Join(tmpDir, "origin")
  104. err = os.Mkdir(origin, 0700)
  105. require.NoError(t, err)
  106. err = ioutil.WriteFile(filepath.Join(origin, "1"), []byte("hello world"), 0700)
  107. require.NoError(t, err)
  108. err = os.Link(filepath.Join(origin, "1"), filepath.Join(origin, "2"))
  109. require.NoError(t, err)
  110. var i1, i2 uint64
  111. i1, err = getNlink(filepath.Join(origin, "1"))
  112. require.NoError(t, err)
  113. // sanity check that we can hardlink
  114. if i1 != 2 {
  115. t.Skipf("skipping since hardlinks don't work here; expected 2 links, got %d", i1)
  116. }
  117. dest := filepath.Join(tmpDir, "dest")
  118. bRdr, err := TarResourceRebase(origin, "origin")
  119. require.NoError(t, err)
  120. dstDir, srcBase := SplitPathDirEntry(origin)
  121. _, dstBase := SplitPathDirEntry(dest)
  122. content := RebaseArchiveEntries(bRdr, srcBase, dstBase)
  123. err = Untar(content, dstDir, &TarOptions{Compression: Uncompressed, NoLchown: true, NoOverwriteDirNonDir: true})
  124. require.NoError(t, err)
  125. i1, err = getInode(filepath.Join(dest, "1"))
  126. require.NoError(t, err)
  127. i2, err = getInode(filepath.Join(dest, "2"))
  128. require.NoError(t, err)
  129. assert.Equal(t, i1, i2)
  130. }
  131. func getNlink(path string) (uint64, error) {
  132. stat, err := os.Stat(path)
  133. if err != nil {
  134. return 0, err
  135. }
  136. statT, ok := stat.Sys().(*syscall.Stat_t)
  137. if !ok {
  138. return 0, fmt.Errorf("expected type *syscall.Stat_t, got %t", stat.Sys())
  139. }
  140. // We need this conversion on ARM64
  141. return uint64(statT.Nlink), nil
  142. }
  143. func getInode(path string) (uint64, error) {
  144. stat, err := os.Stat(path)
  145. if err != nil {
  146. return 0, err
  147. }
  148. statT, ok := stat.Sys().(*syscall.Stat_t)
  149. if !ok {
  150. return 0, fmt.Errorf("expected type *syscall.Stat_t, got %t", stat.Sys())
  151. }
  152. return statT.Ino, nil
  153. }
  154. func TestTarWithBlockCharFifo(t *testing.T) {
  155. origin, err := ioutil.TempDir("", "docker-test-tar-hardlink")
  156. require.NoError(t, err)
  157. defer os.RemoveAll(origin)
  158. err = ioutil.WriteFile(filepath.Join(origin, "1"), []byte("hello world"), 0700)
  159. require.NoError(t, err)
  160. err = system.Mknod(filepath.Join(origin, "2"), unix.S_IFBLK, int(system.Mkdev(int64(12), int64(5))))
  161. require.NoError(t, err)
  162. err = system.Mknod(filepath.Join(origin, "3"), unix.S_IFCHR, int(system.Mkdev(int64(12), int64(5))))
  163. require.NoError(t, err)
  164. err = system.Mknod(filepath.Join(origin, "4"), unix.S_IFIFO, int(system.Mkdev(int64(12), int64(5))))
  165. require.NoError(t, err)
  166. dest, err := ioutil.TempDir("", "docker-test-tar-hardlink-dest")
  167. require.NoError(t, err)
  168. defer os.RemoveAll(dest)
  169. // we'll do this in two steps to separate failure
  170. fh, err := Tar(origin, Uncompressed)
  171. require.NoError(t, err)
  172. // ensure we can read the whole thing with no error, before writing back out
  173. buf, err := ioutil.ReadAll(fh)
  174. require.NoError(t, err)
  175. bRdr := bytes.NewReader(buf)
  176. err = Untar(bRdr, dest, &TarOptions{Compression: Uncompressed})
  177. require.NoError(t, err)
  178. changes, err := ChangesDirs(origin, dest)
  179. require.NoError(t, err)
  180. if len(changes) > 0 {
  181. t.Fatalf("Tar with special device (block, char, fifo) should keep them (recreate them when untar) : %v", changes)
  182. }
  183. }
  184. // TestTarUntarWithXattr is Unix as Lsetxattr is not supported on Windows
  185. func TestTarUntarWithXattr(t *testing.T) {
  186. if runtime.GOOS == "solaris" {
  187. t.Skip()
  188. }
  189. origin, err := ioutil.TempDir("", "docker-test-untar-origin")
  190. require.NoError(t, err)
  191. defer os.RemoveAll(origin)
  192. err = ioutil.WriteFile(filepath.Join(origin, "1"), []byte("hello world"), 0700)
  193. require.NoError(t, err)
  194. err = ioutil.WriteFile(filepath.Join(origin, "2"), []byte("welcome!"), 0700)
  195. require.NoError(t, err)
  196. err = ioutil.WriteFile(filepath.Join(origin, "3"), []byte("will be ignored"), 0700)
  197. require.NoError(t, err)
  198. err = system.Lsetxattr(filepath.Join(origin, "2"), "security.capability", []byte{0x00}, 0)
  199. require.NoError(t, err)
  200. for _, c := range []Compression{
  201. Uncompressed,
  202. Gzip,
  203. } {
  204. changes, err := tarUntar(t, origin, &TarOptions{
  205. Compression: c,
  206. ExcludePatterns: []string{"3"},
  207. })
  208. if err != nil {
  209. t.Fatalf("Error tar/untar for compression %s: %s", c.Extension(), err)
  210. }
  211. if len(changes) != 1 || changes[0].Path != "/3" {
  212. t.Fatalf("Unexpected differences after tarUntar: %v", changes)
  213. }
  214. capability, _ := system.Lgetxattr(filepath.Join(origin, "2"), "security.capability")
  215. if capability == nil && capability[0] != 0x00 {
  216. t.Fatalf("Untar should have kept the 'security.capability' xattr.")
  217. }
  218. }
  219. }