archive_test.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595
  1. package archive
  2. import (
  3. "bytes"
  4. "fmt"
  5. "io"
  6. "io/ioutil"
  7. "os"
  8. "os/exec"
  9. "path"
  10. "path/filepath"
  11. "syscall"
  12. "testing"
  13. "time"
  14. "github.com/docker/docker/vendor/src/code.google.com/p/go/src/pkg/archive/tar"
  15. )
  16. func TestCmdStreamLargeStderr(t *testing.T) {
  17. cmd := exec.Command("/bin/sh", "-c", "dd if=/dev/zero bs=1k count=1000 of=/dev/stderr; echo hello")
  18. out, err := CmdStream(cmd, nil)
  19. if err != nil {
  20. t.Fatalf("Failed to start command: %s", err)
  21. }
  22. errCh := make(chan error)
  23. go func() {
  24. _, err := io.Copy(ioutil.Discard, out)
  25. errCh <- err
  26. }()
  27. select {
  28. case err := <-errCh:
  29. if err != nil {
  30. t.Fatalf("Command should not have failed (err=%.100s...)", err)
  31. }
  32. case <-time.After(5 * time.Second):
  33. t.Fatalf("Command did not complete in 5 seconds; probable deadlock")
  34. }
  35. }
  36. func TestCmdStreamBad(t *testing.T) {
  37. badCmd := exec.Command("/bin/sh", "-c", "echo hello; echo >&2 error couldn\\'t reverse the phase pulser; exit 1")
  38. out, err := CmdStream(badCmd, nil)
  39. if err != nil {
  40. t.Fatalf("Failed to start command: %s", err)
  41. }
  42. if output, err := ioutil.ReadAll(out); err == nil {
  43. t.Fatalf("Command should have failed")
  44. } else if err.Error() != "exit status 1: error couldn't reverse the phase pulser\n" {
  45. t.Fatalf("Wrong error value (%s)", err)
  46. } else if s := string(output); s != "hello\n" {
  47. t.Fatalf("Command output should be '%s', not '%s'", "hello\\n", output)
  48. }
  49. }
  50. func TestCmdStreamGood(t *testing.T) {
  51. cmd := exec.Command("/bin/sh", "-c", "echo hello; exit 0")
  52. out, err := CmdStream(cmd, nil)
  53. if err != nil {
  54. t.Fatal(err)
  55. }
  56. if output, err := ioutil.ReadAll(out); err != nil {
  57. t.Fatalf("Command should not have failed (err=%s)", err)
  58. } else if s := string(output); s != "hello\n" {
  59. t.Fatalf("Command output should be '%s', not '%s'", "hello\\n", output)
  60. }
  61. }
  62. func TestTarFiles(t *testing.T) {
  63. // try without hardlinks
  64. if err := checkNoChanges(1000, false); err != nil {
  65. t.Fatal(err)
  66. }
  67. // try with hardlinks
  68. if err := checkNoChanges(1000, true); err != nil {
  69. t.Fatal(err)
  70. }
  71. }
  72. func checkNoChanges(fileNum int, hardlinks bool) error {
  73. srcDir, err := ioutil.TempDir("", "docker-test-srcDir")
  74. if err != nil {
  75. return err
  76. }
  77. defer os.RemoveAll(srcDir)
  78. destDir, err := ioutil.TempDir("", "docker-test-destDir")
  79. if err != nil {
  80. return err
  81. }
  82. defer os.RemoveAll(destDir)
  83. _, err = prepareUntarSourceDirectory(fileNum, srcDir, hardlinks)
  84. if err != nil {
  85. return err
  86. }
  87. err = TarUntar(srcDir, destDir)
  88. if err != nil {
  89. return err
  90. }
  91. changes, err := ChangesDirs(destDir, srcDir)
  92. if err != nil {
  93. return err
  94. }
  95. if len(changes) > 0 {
  96. return fmt.Errorf("with %d files and %v hardlinks: expected 0 changes, got %d", fileNum, hardlinks, len(changes))
  97. }
  98. return nil
  99. }
  100. func tarUntar(t *testing.T, origin string, options *TarOptions) ([]Change, error) {
  101. archive, err := TarWithOptions(origin, options)
  102. if err != nil {
  103. t.Fatal(err)
  104. }
  105. defer archive.Close()
  106. buf := make([]byte, 10)
  107. if _, err := archive.Read(buf); err != nil {
  108. return nil, err
  109. }
  110. wrap := io.MultiReader(bytes.NewReader(buf), archive)
  111. detectedCompression := DetectCompression(buf)
  112. compression := options.Compression
  113. if detectedCompression.Extension() != compression.Extension() {
  114. return nil, fmt.Errorf("Wrong compression detected. Actual compression: %s, found %s", compression.Extension(), detectedCompression.Extension())
  115. }
  116. tmp, err := ioutil.TempDir("", "docker-test-untar")
  117. if err != nil {
  118. return nil, err
  119. }
  120. defer os.RemoveAll(tmp)
  121. if err := Untar(wrap, tmp, nil); err != nil {
  122. return nil, err
  123. }
  124. if _, err := os.Stat(tmp); err != nil {
  125. return nil, err
  126. }
  127. return ChangesDirs(origin, tmp)
  128. }
  129. func TestTarUntar(t *testing.T) {
  130. origin, err := ioutil.TempDir("", "docker-test-untar-origin")
  131. if err != nil {
  132. t.Fatal(err)
  133. }
  134. defer os.RemoveAll(origin)
  135. if err := ioutil.WriteFile(path.Join(origin, "1"), []byte("hello world"), 0700); err != nil {
  136. t.Fatal(err)
  137. }
  138. if err := ioutil.WriteFile(path.Join(origin, "2"), []byte("welcome!"), 0700); err != nil {
  139. t.Fatal(err)
  140. }
  141. if err := ioutil.WriteFile(path.Join(origin, "3"), []byte("will be ignored"), 0700); err != nil {
  142. t.Fatal(err)
  143. }
  144. for _, c := range []Compression{
  145. Uncompressed,
  146. Gzip,
  147. } {
  148. changes, err := tarUntar(t, origin, &TarOptions{
  149. Compression: c,
  150. Excludes: []string{"3"},
  151. })
  152. if err != nil {
  153. t.Fatalf("Error tar/untar for compression %s: %s", c.Extension(), err)
  154. }
  155. if len(changes) != 1 || changes[0].Path != "/3" {
  156. t.Fatalf("Unexpected differences after tarUntar: %v", changes)
  157. }
  158. }
  159. }
  160. func TestTarWithOptions(t *testing.T) {
  161. origin, err := ioutil.TempDir("", "docker-test-untar-origin")
  162. if err != nil {
  163. t.Fatal(err)
  164. }
  165. defer os.RemoveAll(origin)
  166. if err := ioutil.WriteFile(path.Join(origin, "1"), []byte("hello world"), 0700); err != nil {
  167. t.Fatal(err)
  168. }
  169. if err := ioutil.WriteFile(path.Join(origin, "2"), []byte("welcome!"), 0700); err != nil {
  170. t.Fatal(err)
  171. }
  172. cases := []struct {
  173. opts *TarOptions
  174. numChanges int
  175. }{
  176. {&TarOptions{Includes: []string{"1"}}, 1},
  177. {&TarOptions{Excludes: []string{"2"}}, 1},
  178. }
  179. for _, testCase := range cases {
  180. changes, err := tarUntar(t, origin, testCase.opts)
  181. if err != nil {
  182. t.Fatalf("Error tar/untar when testing inclusion/exclusion: %s", err)
  183. }
  184. if len(changes) != testCase.numChanges {
  185. t.Errorf("Expected %d changes, got %d for %+v:",
  186. testCase.numChanges, len(changes), testCase.opts)
  187. }
  188. }
  189. }
  190. // Some tar archives such as http://haproxy.1wt.eu/download/1.5/src/devel/haproxy-1.5-dev21.tar.gz
  191. // use PAX Global Extended Headers.
  192. // Failing prevents the archives from being uncompressed during ADD
  193. func TestTypeXGlobalHeaderDoesNotFail(t *testing.T) {
  194. hdr := tar.Header{Typeflag: tar.TypeXGlobalHeader}
  195. tmpDir, err := ioutil.TempDir("", "docker-test-archive-pax-test")
  196. if err != nil {
  197. t.Fatal(err)
  198. }
  199. defer os.RemoveAll(tmpDir)
  200. err = createTarFile(filepath.Join(tmpDir, "pax_global_header"), tmpDir, &hdr, nil, true)
  201. if err != nil {
  202. t.Fatal(err)
  203. }
  204. }
  205. // Some tar have both GNU specific (huge uid) and Ustar specific (long name) things.
  206. // Not supposed to happen (should use PAX instead of Ustar for long name) but it does and it should still work.
  207. func TestUntarUstarGnuConflict(t *testing.T) {
  208. f, err := os.Open("testdata/broken.tar")
  209. if err != nil {
  210. t.Fatal(err)
  211. }
  212. found := false
  213. tr := tar.NewReader(f)
  214. // Iterate through the files in the archive.
  215. for {
  216. hdr, err := tr.Next()
  217. if err == io.EOF {
  218. // end of tar archive
  219. break
  220. }
  221. if err != nil {
  222. t.Fatal(err)
  223. }
  224. if hdr.Name == "root/.cpanm/work/1395823785.24209/Plack-1.0030/blib/man3/Plack::Middleware::LighttpdScriptNameFix.3pm" {
  225. found = true
  226. break
  227. }
  228. }
  229. if !found {
  230. t.Fatalf("%s not found in the archive", "root/.cpanm/work/1395823785.24209/Plack-1.0030/blib/man3/Plack::Middleware::LighttpdScriptNameFix.3pm")
  231. }
  232. }
  233. func TestTarWithHardLink(t *testing.T) {
  234. origin, err := ioutil.TempDir("", "docker-test-tar-hardlink")
  235. if err != nil {
  236. t.Fatal(err)
  237. }
  238. defer os.RemoveAll(origin)
  239. if err := ioutil.WriteFile(path.Join(origin, "1"), []byte("hello world"), 0700); err != nil {
  240. t.Fatal(err)
  241. }
  242. if err := os.Link(path.Join(origin, "1"), path.Join(origin, "2")); err != nil {
  243. t.Fatal(err)
  244. }
  245. var i1, i2 uint64
  246. if i1, err = getNlink(path.Join(origin, "1")); err != nil {
  247. t.Fatal(err)
  248. }
  249. // sanity check that we can hardlink
  250. if i1 != 2 {
  251. t.Skipf("skipping since hardlinks don't work here; expected 2 links, got %d", i1)
  252. }
  253. dest, err := ioutil.TempDir("", "docker-test-tar-hardlink-dest")
  254. if err != nil {
  255. t.Fatal(err)
  256. }
  257. defer os.RemoveAll(dest)
  258. // we'll do this in two steps to separate failure
  259. fh, err := Tar(origin, Uncompressed)
  260. if err != nil {
  261. t.Fatal(err)
  262. }
  263. // ensure we can read the whole thing with no error, before writing back out
  264. buf, err := ioutil.ReadAll(fh)
  265. if err != nil {
  266. t.Fatal(err)
  267. }
  268. bRdr := bytes.NewReader(buf)
  269. err = Untar(bRdr, dest, &TarOptions{Compression: Uncompressed})
  270. if err != nil {
  271. t.Fatal(err)
  272. }
  273. if i1, err = getInode(path.Join(dest, "1")); err != nil {
  274. t.Fatal(err)
  275. }
  276. if i2, err = getInode(path.Join(dest, "2")); err != nil {
  277. t.Fatal(err)
  278. }
  279. if i1 != i2 {
  280. t.Errorf("expected matching inodes, but got %d and %d", i1, i2)
  281. }
  282. }
  283. func getNlink(path string) (uint64, error) {
  284. stat, err := os.Stat(path)
  285. if err != nil {
  286. return 0, err
  287. }
  288. statT, ok := stat.Sys().(*syscall.Stat_t)
  289. if !ok {
  290. return 0, fmt.Errorf("expected type *syscall.Stat_t, got %t", stat.Sys())
  291. }
  292. return statT.Nlink, nil
  293. }
  294. func getInode(path string) (uint64, error) {
  295. stat, err := os.Stat(path)
  296. if err != nil {
  297. return 0, err
  298. }
  299. statT, ok := stat.Sys().(*syscall.Stat_t)
  300. if !ok {
  301. return 0, fmt.Errorf("expected type *syscall.Stat_t, got %t", stat.Sys())
  302. }
  303. return statT.Ino, nil
  304. }
  305. func prepareUntarSourceDirectory(numberOfFiles int, targetPath string, makeLinks bool) (int, error) {
  306. fileData := []byte("fooo")
  307. for n := 0; n < numberOfFiles; n++ {
  308. fileName := fmt.Sprintf("file-%d", n)
  309. if err := ioutil.WriteFile(path.Join(targetPath, fileName), fileData, 0700); err != nil {
  310. return 0, err
  311. }
  312. if makeLinks {
  313. if err := os.Link(path.Join(targetPath, fileName), path.Join(targetPath, fileName+"-link")); err != nil {
  314. return 0, err
  315. }
  316. }
  317. }
  318. totalSize := numberOfFiles * len(fileData)
  319. return totalSize, nil
  320. }
  321. func BenchmarkTarUntar(b *testing.B) {
  322. origin, err := ioutil.TempDir("", "docker-test-untar-origin")
  323. if err != nil {
  324. b.Fatal(err)
  325. }
  326. tempDir, err := ioutil.TempDir("", "docker-test-untar-destination")
  327. if err != nil {
  328. b.Fatal(err)
  329. }
  330. target := path.Join(tempDir, "dest")
  331. n, err := prepareUntarSourceDirectory(100, origin, false)
  332. if err != nil {
  333. b.Fatal(err)
  334. }
  335. defer os.RemoveAll(origin)
  336. defer os.RemoveAll(tempDir)
  337. b.ResetTimer()
  338. b.SetBytes(int64(n))
  339. for n := 0; n < b.N; n++ {
  340. err := TarUntar(origin, target)
  341. if err != nil {
  342. b.Fatal(err)
  343. }
  344. os.RemoveAll(target)
  345. }
  346. }
  347. func BenchmarkTarUntarWithLinks(b *testing.B) {
  348. origin, err := ioutil.TempDir("", "docker-test-untar-origin")
  349. if err != nil {
  350. b.Fatal(err)
  351. }
  352. tempDir, err := ioutil.TempDir("", "docker-test-untar-destination")
  353. if err != nil {
  354. b.Fatal(err)
  355. }
  356. target := path.Join(tempDir, "dest")
  357. n, err := prepareUntarSourceDirectory(100, origin, true)
  358. if err != nil {
  359. b.Fatal(err)
  360. }
  361. defer os.RemoveAll(origin)
  362. defer os.RemoveAll(tempDir)
  363. b.ResetTimer()
  364. b.SetBytes(int64(n))
  365. for n := 0; n < b.N; n++ {
  366. err := TarUntar(origin, target)
  367. if err != nil {
  368. b.Fatal(err)
  369. }
  370. os.RemoveAll(target)
  371. }
  372. }
  373. func TestUntarInvalidFilenames(t *testing.T) {
  374. for i, headers := range [][]*tar.Header{
  375. {
  376. {
  377. Name: "../victim/dotdot",
  378. Typeflag: tar.TypeReg,
  379. Mode: 0644,
  380. },
  381. },
  382. {
  383. {
  384. // Note the leading slash
  385. Name: "/../victim/slash-dotdot",
  386. Typeflag: tar.TypeReg,
  387. Mode: 0644,
  388. },
  389. },
  390. } {
  391. if err := testBreakout("untar", "docker-TestUntarInvalidFilenames", headers); err != nil {
  392. t.Fatalf("i=%d. %v", i, err)
  393. }
  394. }
  395. }
  396. func TestUntarInvalidHardlink(t *testing.T) {
  397. for i, headers := range [][]*tar.Header{
  398. { // try reading victim/hello (../)
  399. {
  400. Name: "dotdot",
  401. Typeflag: tar.TypeLink,
  402. Linkname: "../victim/hello",
  403. Mode: 0644,
  404. },
  405. },
  406. { // try reading victim/hello (/../)
  407. {
  408. Name: "slash-dotdot",
  409. Typeflag: tar.TypeLink,
  410. // Note the leading slash
  411. Linkname: "/../victim/hello",
  412. Mode: 0644,
  413. },
  414. },
  415. { // try writing victim/file
  416. {
  417. Name: "loophole-victim",
  418. Typeflag: tar.TypeLink,
  419. Linkname: "../victim",
  420. Mode: 0755,
  421. },
  422. {
  423. Name: "loophole-victim/file",
  424. Typeflag: tar.TypeReg,
  425. Mode: 0644,
  426. },
  427. },
  428. { // try reading victim/hello (hardlink, symlink)
  429. {
  430. Name: "loophole-victim",
  431. Typeflag: tar.TypeLink,
  432. Linkname: "../victim",
  433. Mode: 0755,
  434. },
  435. {
  436. Name: "symlink",
  437. Typeflag: tar.TypeSymlink,
  438. Linkname: "loophole-victim/hello",
  439. Mode: 0644,
  440. },
  441. },
  442. { // Try reading victim/hello (hardlink, hardlink)
  443. {
  444. Name: "loophole-victim",
  445. Typeflag: tar.TypeLink,
  446. Linkname: "../victim",
  447. Mode: 0755,
  448. },
  449. {
  450. Name: "hardlink",
  451. Typeflag: tar.TypeLink,
  452. Linkname: "loophole-victim/hello",
  453. Mode: 0644,
  454. },
  455. },
  456. { // Try removing victim directory (hardlink)
  457. {
  458. Name: "loophole-victim",
  459. Typeflag: tar.TypeLink,
  460. Linkname: "../victim",
  461. Mode: 0755,
  462. },
  463. {
  464. Name: "loophole-victim",
  465. Typeflag: tar.TypeReg,
  466. Mode: 0644,
  467. },
  468. },
  469. } {
  470. if err := testBreakout("untar", "docker-TestUntarInvalidHardlink", headers); err != nil {
  471. t.Fatalf("i=%d. %v", i, err)
  472. }
  473. }
  474. }
  475. func TestUntarInvalidSymlink(t *testing.T) {
  476. for i, headers := range [][]*tar.Header{
  477. { // try reading victim/hello (../)
  478. {
  479. Name: "dotdot",
  480. Typeflag: tar.TypeSymlink,
  481. Linkname: "../victim/hello",
  482. Mode: 0644,
  483. },
  484. },
  485. { // try reading victim/hello (/../)
  486. {
  487. Name: "slash-dotdot",
  488. Typeflag: tar.TypeSymlink,
  489. // Note the leading slash
  490. Linkname: "/../victim/hello",
  491. Mode: 0644,
  492. },
  493. },
  494. { // try writing victim/file
  495. {
  496. Name: "loophole-victim",
  497. Typeflag: tar.TypeSymlink,
  498. Linkname: "../victim",
  499. Mode: 0755,
  500. },
  501. {
  502. Name: "loophole-victim/file",
  503. Typeflag: tar.TypeReg,
  504. Mode: 0644,
  505. },
  506. },
  507. { // try reading victim/hello (symlink, symlink)
  508. {
  509. Name: "loophole-victim",
  510. Typeflag: tar.TypeSymlink,
  511. Linkname: "../victim",
  512. Mode: 0755,
  513. },
  514. {
  515. Name: "symlink",
  516. Typeflag: tar.TypeSymlink,
  517. Linkname: "loophole-victim/hello",
  518. Mode: 0644,
  519. },
  520. },
  521. { // try reading victim/hello (symlink, hardlink)
  522. {
  523. Name: "loophole-victim",
  524. Typeflag: tar.TypeSymlink,
  525. Linkname: "../victim",
  526. Mode: 0755,
  527. },
  528. {
  529. Name: "hardlink",
  530. Typeflag: tar.TypeLink,
  531. Linkname: "loophole-victim/hello",
  532. Mode: 0644,
  533. },
  534. },
  535. { // try removing victim directory (symlink)
  536. {
  537. Name: "loophole-victim",
  538. Typeflag: tar.TypeSymlink,
  539. Linkname: "../victim",
  540. Mode: 0755,
  541. },
  542. {
  543. Name: "loophole-victim",
  544. Typeflag: tar.TypeReg,
  545. Mode: 0644,
  546. },
  547. },
  548. } {
  549. if err := testBreakout("untar", "docker-TestUntarInvalidSymlink", headers); err != nil {
  550. t.Fatalf("i=%d. %v", i, err)
  551. }
  552. }
  553. }