oci_linux_test.go 8.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252
  1. package daemon // import "github.com/docker/docker/daemon"
  2. import (
  3. "context"
  4. "os"
  5. "path/filepath"
  6. "testing"
  7. containertypes "github.com/docker/docker/api/types/container"
  8. "github.com/docker/docker/container"
  9. "github.com/docker/docker/daemon/config"
  10. "github.com/docker/docker/daemon/network"
  11. "github.com/docker/docker/libnetwork"
  12. nwconfig "github.com/docker/docker/libnetwork/config"
  13. "github.com/google/go-cmp/cmp/cmpopts"
  14. "github.com/opencontainers/runtime-spec/specs-go"
  15. "golang.org/x/sys/unix"
  16. "gotest.tools/v3/assert"
  17. is "gotest.tools/v3/assert/cmp"
  18. "gotest.tools/v3/skip"
  19. )
  20. func setupFakeDaemon(t *testing.T, c *container.Container) *Daemon {
  21. t.Helper()
  22. root := t.TempDir()
  23. rootfs := filepath.Join(root, "rootfs")
  24. err := os.MkdirAll(rootfs, 0o755)
  25. assert.NilError(t, err)
  26. netController, err := libnetwork.New(nwconfig.OptionDataDir(t.TempDir()))
  27. assert.NilError(t, err)
  28. d := &Daemon{
  29. // some empty structs to avoid getting a panic
  30. // caused by a null pointer dereference
  31. linkIndex: newLinkIndex(),
  32. netController: netController,
  33. imageService: &fakeImageService{},
  34. }
  35. c.Root = root
  36. c.BaseFS = rootfs
  37. if c.Config == nil {
  38. c.Config = new(containertypes.Config)
  39. }
  40. if c.HostConfig == nil {
  41. c.HostConfig = new(containertypes.HostConfig)
  42. }
  43. if c.NetworkSettings == nil {
  44. c.NetworkSettings = &network.Settings{Networks: make(map[string]*network.EndpointSettings)}
  45. }
  46. // HORRIBLE HACK: clean up shm mounts leaked by some tests. Otherwise the
  47. // offending tests would fail due to the mounts blocking the temporary
  48. // directory from being cleaned up.
  49. t.Cleanup(func() {
  50. if c.ShmPath != "" {
  51. var err error
  52. for err == nil { // Some tests over-mount over the same path multiple times.
  53. err = unix.Unmount(c.ShmPath, unix.MNT_DETACH)
  54. }
  55. }
  56. })
  57. return d
  58. }
  59. type fakeImageService struct {
  60. ImageService
  61. }
  62. func (i *fakeImageService) StorageDriver() string {
  63. return "overlay"
  64. }
  65. // TestTmpfsDevShmNoDupMount checks that a user-specified /dev/shm tmpfs
  66. // mount (as in "docker run --tmpfs /dev/shm:rw,size=NNN") does not result
  67. // in "Duplicate mount point" error from the engine.
  68. // https://github.com/moby/moby/issues/35455
  69. func TestTmpfsDevShmNoDupMount(t *testing.T) {
  70. skip.If(t, os.Getuid() != 0, "skipping test that requires root")
  71. c := &container.Container{
  72. ShmPath: "foobar", // non-empty, for c.IpcMounts() to work
  73. HostConfig: &containertypes.HostConfig{
  74. IpcMode: containertypes.IPCModeShareable, // default mode
  75. // --tmpfs /dev/shm:rw,exec,size=NNN
  76. Tmpfs: map[string]string{
  77. "/dev/shm": "rw,exec,size=1g",
  78. },
  79. },
  80. }
  81. d := setupFakeDaemon(t, c)
  82. _, err := d.createSpec(context.TODO(), &configStore{}, c, nil)
  83. assert.Check(t, err)
  84. }
  85. // TestIpcPrivateVsReadonly checks that in case of IpcMode: private
  86. // and ReadonlyRootfs: true (as in "docker run --ipc private --read-only")
  87. // the resulting /dev/shm mount is NOT made read-only.
  88. // https://github.com/moby/moby/issues/36503
  89. func TestIpcPrivateVsReadonly(t *testing.T) {
  90. skip.If(t, os.Getuid() != 0, "skipping test that requires root")
  91. c := &container.Container{
  92. HostConfig: &containertypes.HostConfig{
  93. IpcMode: containertypes.IPCModePrivate,
  94. ReadonlyRootfs: true,
  95. },
  96. }
  97. d := setupFakeDaemon(t, c)
  98. s, err := d.createSpec(context.TODO(), &configStore{}, c, nil)
  99. assert.Check(t, err)
  100. // Find the /dev/shm mount in ms, check it does not have ro
  101. for _, m := range s.Mounts {
  102. if m.Destination != "/dev/shm" {
  103. continue
  104. }
  105. assert.Check(t, is.Equal(false, inSlice(m.Options, "ro")))
  106. }
  107. }
  108. // TestSysctlOverride ensures that any implicit sysctls (such as
  109. // Config.Domainname) are overridden by an explicit sysctl in the HostConfig.
  110. func TestSysctlOverride(t *testing.T) {
  111. skip.If(t, os.Getuid() != 0, "skipping test that requires root")
  112. c := &container.Container{
  113. Config: &containertypes.Config{
  114. Hostname: "foobar",
  115. Domainname: "baz.cyphar.com",
  116. },
  117. HostConfig: &containertypes.HostConfig{
  118. NetworkMode: "bridge",
  119. Sysctls: map[string]string{},
  120. },
  121. }
  122. d := setupFakeDaemon(t, c)
  123. // Ensure that the implicit sysctl is set correctly.
  124. s, err := d.createSpec(context.TODO(), &configStore{}, c, nil)
  125. assert.NilError(t, err)
  126. assert.Equal(t, s.Hostname, "foobar")
  127. assert.Equal(t, s.Linux.Sysctl["kernel.domainname"], c.Config.Domainname)
  128. if sysctlExists("net.ipv4.ip_unprivileged_port_start") {
  129. assert.Equal(t, s.Linux.Sysctl["net.ipv4.ip_unprivileged_port_start"], "0")
  130. }
  131. if sysctlExists("net.ipv4.ping_group_range") {
  132. assert.Equal(t, s.Linux.Sysctl["net.ipv4.ping_group_range"], "0 2147483647")
  133. }
  134. // Set an explicit sysctl.
  135. c.HostConfig.Sysctls["kernel.domainname"] = "foobar.net"
  136. assert.Assert(t, c.HostConfig.Sysctls["kernel.domainname"] != c.Config.Domainname)
  137. c.HostConfig.Sysctls["net.ipv4.ip_unprivileged_port_start"] = "1024"
  138. s, err = d.createSpec(context.TODO(), &configStore{}, c, nil)
  139. assert.NilError(t, err)
  140. assert.Equal(t, s.Hostname, "foobar")
  141. assert.Equal(t, s.Linux.Sysctl["kernel.domainname"], c.HostConfig.Sysctls["kernel.domainname"])
  142. assert.Equal(t, s.Linux.Sysctl["net.ipv4.ip_unprivileged_port_start"], c.HostConfig.Sysctls["net.ipv4.ip_unprivileged_port_start"])
  143. // Ensure the ping_group_range is not set on a daemon with user-namespaces enabled
  144. s, err = d.createSpec(context.TODO(), &configStore{Config: config.Config{RemappedRoot: "dummy:dummy"}}, c, nil)
  145. assert.NilError(t, err)
  146. _, ok := s.Linux.Sysctl["net.ipv4.ping_group_range"]
  147. assert.Assert(t, !ok)
  148. // Ensure the ping_group_range is set on a container in "host" userns mode
  149. // on a daemon with user-namespaces enabled
  150. c.HostConfig.UsernsMode = "host"
  151. s, err = d.createSpec(context.TODO(), &configStore{Config: config.Config{RemappedRoot: "dummy:dummy"}}, c, nil)
  152. assert.NilError(t, err)
  153. assert.Equal(t, s.Linux.Sysctl["net.ipv4.ping_group_range"], "0 2147483647")
  154. }
  155. // TestSysctlOverrideHost ensures that any implicit network sysctls are not set
  156. // with host networking
  157. func TestSysctlOverrideHost(t *testing.T) {
  158. skip.If(t, os.Getuid() != 0, "skipping test that requires root")
  159. c := &container.Container{
  160. Config: &containertypes.Config{},
  161. HostConfig: &containertypes.HostConfig{
  162. NetworkMode: "host",
  163. Sysctls: map[string]string{},
  164. },
  165. }
  166. d := setupFakeDaemon(t, c)
  167. // Ensure that the implicit sysctl is not set
  168. s, err := d.createSpec(context.TODO(), &configStore{}, c, nil)
  169. assert.NilError(t, err)
  170. assert.Equal(t, s.Linux.Sysctl["net.ipv4.ip_unprivileged_port_start"], "")
  171. assert.Equal(t, s.Linux.Sysctl["net.ipv4.ping_group_range"], "")
  172. // Set an explicit sysctl.
  173. c.HostConfig.Sysctls["net.ipv4.ip_unprivileged_port_start"] = "1024"
  174. s, err = d.createSpec(context.TODO(), &configStore{}, c, nil)
  175. assert.NilError(t, err)
  176. assert.Equal(t, s.Linux.Sysctl["net.ipv4.ip_unprivileged_port_start"], c.HostConfig.Sysctls["net.ipv4.ip_unprivileged_port_start"])
  177. }
  178. func TestGetSourceMount(t *testing.T) {
  179. // must be able to find source mount for /
  180. mnt, _, err := getSourceMount("/")
  181. assert.NilError(t, err)
  182. assert.Equal(t, mnt, "/")
  183. // must be able to find source mount for current directory
  184. cwd, err := os.Getwd()
  185. assert.NilError(t, err)
  186. _, _, err = getSourceMount(cwd)
  187. assert.NilError(t, err)
  188. }
  189. func TestDefaultResources(t *testing.T) {
  190. skip.If(t, os.Getuid() != 0, "skipping test that requires root") // TODO: is this actually true? I'm guilty of following the cargo cult here.
  191. c := &container.Container{
  192. HostConfig: &containertypes.HostConfig{
  193. IpcMode: containertypes.IPCModeNone,
  194. },
  195. }
  196. d := setupFakeDaemon(t, c)
  197. s, err := d.createSpec(context.Background(), &configStore{}, c, nil)
  198. assert.NilError(t, err)
  199. checkResourcesAreUnset(t, s.Linux.Resources)
  200. }
  201. func checkResourcesAreUnset(t *testing.T, r *specs.LinuxResources) {
  202. t.Helper()
  203. if r != nil {
  204. if r.Memory != nil {
  205. assert.Check(t, is.DeepEqual(r.Memory, &specs.LinuxMemory{}))
  206. }
  207. if r.CPU != nil {
  208. assert.Check(t, is.DeepEqual(r.CPU, &specs.LinuxCPU{}))
  209. }
  210. assert.Check(t, is.Nil(r.Pids))
  211. if r.BlockIO != nil {
  212. assert.Check(t, is.DeepEqual(r.BlockIO, &specs.LinuxBlockIO{}, cmpopts.EquateEmpty()))
  213. }
  214. if r.Network != nil {
  215. assert.Check(t, is.DeepEqual(r.Network, &specs.LinuxNetwork{}, cmpopts.EquateEmpty()))
  216. }
  217. }
  218. }