build_cgroupns_linux_test.go 2.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596
  1. package build // import "github.com/docker/docker/integration/build"
  2. import (
  3. "context"
  4. "encoding/json"
  5. "io"
  6. "strings"
  7. "testing"
  8. "github.com/docker/docker/api/types"
  9. "github.com/docker/docker/integration/internal/requirement"
  10. "github.com/docker/docker/pkg/jsonmessage"
  11. "github.com/docker/docker/testutil"
  12. "github.com/docker/docker/testutil/daemon"
  13. "github.com/docker/docker/testutil/fakecontext"
  14. "gotest.tools/v3/assert"
  15. "gotest.tools/v3/skip"
  16. )
  17. // Finds the output of `readlink /proc/<pid>/ns/cgroup` in build output
  18. func getCgroupFromBuildOutput(buildOutput io.Reader) (string, error) {
  19. const prefix = "cgroup:"
  20. dec := json.NewDecoder(buildOutput)
  21. for {
  22. m := jsonmessage.JSONMessage{}
  23. err := dec.Decode(&m)
  24. if err == io.EOF {
  25. return "", nil
  26. }
  27. if err != nil {
  28. return "", err
  29. }
  30. if ix := strings.Index(m.Stream, prefix); ix == 0 {
  31. return strings.TrimSpace(m.Stream), nil
  32. }
  33. }
  34. }
  35. // Runs a docker build against a daemon with the given cgroup namespace default value.
  36. // Returns the container cgroup and daemon cgroup.
  37. func testBuildWithCgroupNs(ctx context.Context, t *testing.T, daemonNsMode string) (string, string) {
  38. d := daemon.New(t, daemon.WithDefaultCgroupNamespaceMode(daemonNsMode))
  39. d.StartWithBusybox(ctx, t)
  40. defer d.Stop(t)
  41. dockerfile := `
  42. FROM busybox
  43. RUN readlink /proc/self/ns/cgroup
  44. `
  45. source := fakecontext.New(t, "", fakecontext.WithDockerfile(dockerfile))
  46. defer source.Close()
  47. client := d.NewClientT(t)
  48. resp, err := client.ImageBuild(ctx,
  49. source.AsTarReader(t),
  50. types.ImageBuildOptions{
  51. Remove: true,
  52. ForceRemove: true,
  53. Tags: []string{"buildcgroupns"},
  54. })
  55. assert.NilError(t, err)
  56. defer resp.Body.Close()
  57. containerCgroup, err := getCgroupFromBuildOutput(resp.Body)
  58. assert.NilError(t, err)
  59. daemonCgroup := d.CgroupNamespace(t)
  60. return containerCgroup, daemonCgroup
  61. }
  62. func TestCgroupNamespacesBuild(t *testing.T) {
  63. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  64. skip.If(t, testEnv.IsRemoteDaemon())
  65. skip.If(t, !requirement.CgroupNamespacesEnabled())
  66. ctx := testutil.StartSpan(baseContext, t)
  67. // When the daemon defaults to private cgroup namespaces, containers launched
  68. // should be in their own private cgroup namespace by default
  69. containerCgroup, daemonCgroup := testBuildWithCgroupNs(ctx, t, "private")
  70. assert.Assert(t, daemonCgroup != containerCgroup)
  71. }
  72. func TestCgroupNamespacesBuildDaemonHostMode(t *testing.T) {
  73. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  74. skip.If(t, testEnv.IsRemoteDaemon())
  75. skip.If(t, !requirement.CgroupNamespacesEnabled())
  76. ctx := testutil.StartSpan(baseContext, t)
  77. // When the daemon defaults to host cgroup namespaces, containers
  78. // launched should not be inside their own cgroup namespaces
  79. containerCgroup, daemonCgroup := testBuildWithCgroupNs(ctx, t, "host")
  80. assert.Assert(t, daemonCgroup == containerCgroup)
  81. }