moby/daemon/containerd/image_test.go
Paweł Gronowski dade279565
c8d/list: Add Images benchmark
Benchmark the `Images` implementation (image list) against an image
store with 10, 100 and 1000 random images. Currently the images are
single-platform only.

The images are generated randomly, but a fixed seed is used so the
actual testing data will be the same across different executions.

Because the content store is not a real containerd image store but a
local implementation, a small delay (500us) is added to each content
store method call. This is to simulate a real-world usage where each
containerd client call requires a gRPC call.

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
2024-03-19 09:38:56 +01:00

311 lines
8.1 KiB
Go

package containerd
import (
"context"
"io"
"math/rand"
"path/filepath"
"testing"
"github.com/containerd/containerd/images"
"github.com/containerd/containerd/metadata"
"github.com/containerd/containerd/namespaces"
"github.com/containerd/containerd/snapshots"
"github.com/containerd/log/logtest"
"github.com/distribution/reference"
dockerimages "github.com/docker/docker/daemon/images"
"github.com/opencontainers/go-digest"
ocispec "github.com/opencontainers/image-spec/specs-go/v1"
"go.etcd.io/bbolt"
"gotest.tools/v3/assert"
is "gotest.tools/v3/assert/cmp"
)
func TestLookup(t *testing.T) {
ctx := namespaces.WithNamespace(context.TODO(), "testing")
ctx = logtest.WithT(ctx, t)
mdb := newTestDB(ctx, t)
service := &ImageService{
images: metadata.NewImageStore(mdb),
}
ubuntuLatest := images.Image{
Name: "docker.io/library/ubuntu:latest",
Target: desc(10),
}
ubuntuLatestWithDigest := images.Image{
Name: "docker.io/library/ubuntu:latest@" + digestFor(10).String(),
Target: desc(10),
}
ubuntuLatestWithOldDigest := images.Image{
Name: "docker.io/library/ubuntu:latest@" + digestFor(11).String(),
Target: desc(11),
}
ambiguousShortName := images.Image{
Name: "docker.io/library/abcdef:latest",
Target: desc(12),
}
ambiguousShortNameWithDigest := images.Image{
Name: "docker.io/library/abcdef:latest@" + digestFor(12).String(),
Target: desc(12),
}
shortNameIsHashAlgorithm := images.Image{
Name: "docker.io/library/sha256:defcab",
Target: desc(13),
}
testImages := []images.Image{
ubuntuLatest,
ubuntuLatestWithDigest,
ubuntuLatestWithOldDigest,
ambiguousShortName,
ambiguousShortNameWithDigest,
shortNameIsHashAlgorithm,
{
Name: "docker.io/test/volatile:retried",
Target: desc(14),
},
{
Name: "docker.io/test/volatile:inconsistent",
Target: desc(15),
},
}
for _, img := range testImages {
if _, err := service.images.Create(ctx, img); err != nil {
t.Fatalf("failed to create image %q: %v", img.Name, err)
}
}
for _, tc := range []struct {
lookup string
img *images.Image
all []images.Image
err error
}{
{
// Get ubuntu images with default "latest" tag
lookup: "ubuntu",
img: &ubuntuLatest,
all: []images.Image{ubuntuLatest, ubuntuLatestWithDigest},
},
{
// Get all images by image id
lookup: ubuntuLatest.Target.Digest.String(),
img: nil,
all: []images.Image{ubuntuLatest, ubuntuLatestWithDigest},
},
{
// Fail to lookup reference with no tag, reference has both tag and digest
lookup: "ubuntu@" + ubuntuLatestWithOldDigest.Target.Digest.String(),
img: nil,
all: []images.Image{ubuntuLatestWithOldDigest},
},
{
// Get all image with both tag and digest
lookup: "ubuntu:latest@" + ubuntuLatestWithOldDigest.Target.Digest.String(),
img: &ubuntuLatestWithOldDigest,
all: []images.Image{ubuntuLatestWithOldDigest},
},
{
// Fail to lookup reference with no tag for digest that doesn't exist
lookup: "ubuntu@" + digestFor(20).String(),
err: dockerimages.ErrImageDoesNotExist{Ref: nameDigest("ubuntu", digestFor(20))},
},
{
// Fail to lookup reference with nonexistent tag
lookup: "ubuntu:nonexistent",
err: dockerimages.ErrImageDoesNotExist{Ref: nameTag("ubuntu", "nonexistent")},
},
{
// Get abcdef image which also matches short image id
lookup: "abcdef",
img: &ambiguousShortName,
all: []images.Image{ambiguousShortName, ambiguousShortNameWithDigest},
},
{
// Fail to lookup image named "sha256" with tag that doesn't exist
lookup: "sha256:abcdef",
err: dockerimages.ErrImageDoesNotExist{Ref: nameTag("sha256", "abcdef")},
},
{
// Lookup with shortened image id
lookup: ambiguousShortName.Target.Digest.Encoded()[:8],
img: nil,
all: []images.Image{ambiguousShortName, ambiguousShortNameWithDigest},
},
{
// Lookup an actual image named "sha256" in the default namespace
lookup: "sha256:defcab",
img: &shortNameIsHashAlgorithm,
all: []images.Image{shortNameIsHashAlgorithm},
},
} {
tc := tc
t.Run(tc.lookup, func(t *testing.T) {
t.Parallel()
img, all, err := service.resolveAllReferences(ctx, tc.lookup)
if tc.err == nil {
assert.NilError(t, err)
} else {
assert.Error(t, err, tc.err.Error())
}
if tc.img == nil {
assert.Assert(t, is.Nil(img))
} else {
assert.Assert(t, img != nil)
assert.Check(t, is.Equal(img.Name, tc.img.Name))
assert.Check(t, is.Equal(img.Target.Digest, tc.img.Target.Digest))
}
assert.Assert(t, is.Len(tc.all, len(all)))
// Order should match
for i := range all {
assert.Check(t, is.Equal(all[i].Name, tc.all[i].Name), "image[%d]", i)
assert.Check(t, is.Equal(all[i].Target.Digest, tc.all[i].Target.Digest), "image[%d]", i)
}
})
}
t.Run("fail-inconsistency", func(t *testing.T) {
service := &ImageService{
images: &mutateOnGetImageStore{
Store: service.images,
getMutations: []images.Image{
{
Name: "docker.io/test/volatile:inconsistent",
Target: desc(18),
},
{
Name: "docker.io/test/volatile:inconsistent",
Target: desc(19),
},
{
Name: "docker.io/test/volatile:inconsistent",
Target: desc(20),
},
{
Name: "docker.io/test/volatile:inconsistent",
Target: desc(21),
},
{
Name: "docker.io/test/volatile:inconsistent",
Target: desc(22),
},
},
t: t,
},
}
_, _, err := service.resolveAllReferences(ctx, "test/volatile:inconsistent")
assert.ErrorIs(t, err, errInconsistentData)
})
t.Run("retry-inconsistency", func(t *testing.T) {
service := &ImageService{
images: &mutateOnGetImageStore{
Store: service.images,
getMutations: []images.Image{
{
Name: "docker.io/test/volatile:retried",
Target: desc(16),
},
{
Name: "docker.io/test/volatile:retried",
Target: desc(17),
},
},
t: t,
},
}
img, all, err := service.resolveAllReferences(ctx, "test/volatile:retried")
assert.NilError(t, err)
assert.Assert(t, img != nil)
assert.Check(t, is.Equal(img.Name, "docker.io/test/volatile:retried"))
assert.Check(t, is.Equal(img.Target.Digest, digestFor(17)))
assert.Assert(t, is.Len(all, 1))
assert.Check(t, is.Equal(all[0].Name, "docker.io/test/volatile:retried"))
assert.Check(t, is.Equal(all[0].Target.Digest, digestFor(17)))
})
}
type mutateOnGetImageStore struct {
images.Store
getMutations []images.Image
t *testing.T
}
func (m *mutateOnGetImageStore) Get(ctx context.Context, name string) (images.Image, error) {
img, err := m.Store.Get(ctx, name)
if len(m.getMutations) > 0 {
m.Store.Update(ctx, m.getMutations[0])
m.getMutations = m.getMutations[1:]
m.t.Logf("Get %s", name)
}
return img, err
}
func nameDigest(name string, dgst digest.Digest) reference.Reference {
named, _ := reference.WithName(name)
digested, _ := reference.WithDigest(named, dgst)
return digested
}
func nameTag(name, tag string) reference.Reference {
named, _ := reference.WithName(name)
tagged, _ := reference.WithTag(named, tag)
return tagged
}
func desc(size int64) ocispec.Descriptor {
return ocispec.Descriptor{
Digest: digestFor(size),
Size: size,
MediaType: ocispec.MediaTypeImageIndex,
}
}
func digestFor(i int64) digest.Digest {
r := rand.New(rand.NewSource(i))
dgstr := digest.SHA256.Digester()
_, err := io.Copy(dgstr.Hash(), io.LimitReader(r, i))
if err != nil {
panic(err)
}
return dgstr.Digest()
}
func newTestDB(ctx context.Context, t testing.TB) *metadata.DB {
t.Helper()
p := filepath.Join(t.TempDir(), "metadata")
bdb, err := bbolt.Open(p, 0600, &bbolt.Options{})
if err != nil {
t.Fatal(err)
}
t.Cleanup(func() { bdb.Close() })
mdb := metadata.NewDB(bdb, nil, nil)
if err := mdb.Init(ctx); err != nil {
t.Fatal(err)
}
return mdb
}
type testSnapshotterService struct {
snapshots.Snapshotter
}
func (s *testSnapshotterService) Stat(ctx context.Context, key string) (snapshots.Info, error) {
return snapshots.Info{}, nil
}
func (s *testSnapshotterService) Usage(ctx context.Context, key string) (snapshots.Usage, error) {
return snapshots.Usage{}, nil
}