mirror of
https://github.com/opencontainers/runc.git
synced 2026-04-22 23:17:17 +08:00
e6048715e4
gofumpt (mvdan.cc/gofumpt) is a fork of gofmt with stricter rules. Brought to you by git ls-files \*.go | grep -v ^vendor/ | xargs gofumpt -s -w Looking at the diff, all these changes make sense. Also, replace gofmt with gofumpt in golangci.yml. Signed-off-by: Kir Kolyshkin <kolyshkin@gmail.com>
171 lines
4.6 KiB
Go
171 lines
4.6 KiB
Go
package systemd
|
|
|
|
import (
|
|
"bytes"
|
|
"os"
|
|
"os/exec"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/opencontainers/runc/libcontainer/cgroups"
|
|
"github.com/opencontainers/runc/libcontainer/configs"
|
|
"github.com/opencontainers/runc/libcontainer/devices"
|
|
)
|
|
|
|
func TestSystemdVersion(t *testing.T) {
|
|
systemdVersionTests := []struct {
|
|
verStr string
|
|
expectedVer int
|
|
expectErr bool
|
|
}{
|
|
{`"219"`, 219, false},
|
|
{`"v245.4-1.fc32"`, 245, false},
|
|
{`"241-1"`, 241, false},
|
|
{`"v241-1"`, 241, false},
|
|
{"NaN", 0, true},
|
|
{"", 0, true},
|
|
}
|
|
for _, sdTest := range systemdVersionTests {
|
|
ver, err := systemdVersionAtoi(sdTest.verStr)
|
|
if !sdTest.expectErr && err != nil {
|
|
t.Errorf("systemdVersionAtoi(%s); want nil; got %v", sdTest.verStr, err)
|
|
}
|
|
if sdTest.expectErr && err == nil {
|
|
t.Errorf("systemdVersionAtoi(%s); wanted failure; got nil", sdTest.verStr)
|
|
}
|
|
if ver != sdTest.expectedVer {
|
|
t.Errorf("systemdVersionAtoi(%s); want %d; got %d", sdTest.verStr, sdTest.expectedVer, ver)
|
|
}
|
|
}
|
|
}
|
|
|
|
func newManager(config *configs.Cgroup) cgroups.Manager {
|
|
if cgroups.IsCgroup2UnifiedMode() {
|
|
return NewUnifiedManager(config, "", false)
|
|
}
|
|
return NewLegacyManager(config, nil)
|
|
}
|
|
|
|
func testSkipDevices(t *testing.T, skipDevices bool, expected []string) {
|
|
if !IsRunningSystemd() {
|
|
t.Skip("Test requires systemd.")
|
|
}
|
|
if os.Geteuid() != 0 {
|
|
t.Skip("Test requires root.")
|
|
}
|
|
|
|
podConfig := &configs.Cgroup{
|
|
Parent: "system.slice",
|
|
Name: "system-runc_test_pods.slice",
|
|
Resources: &configs.Resources{
|
|
SkipDevices: skipDevices,
|
|
},
|
|
}
|
|
// Create "pods" cgroup (a systemd slice to hold containers).
|
|
pm := newManager(podConfig)
|
|
defer pm.Destroy() //nolint:errcheck
|
|
if err := pm.Apply(-1); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if err := pm.Set(podConfig.Resources); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
config := &configs.Cgroup{
|
|
Parent: "system-runc_test_pods.slice",
|
|
ScopePrefix: "test",
|
|
Name: "SkipDevices",
|
|
Resources: &configs.Resources{
|
|
Devices: []*devices.Rule{
|
|
// Allow access to /dev/full only.
|
|
{
|
|
Type: devices.CharDevice,
|
|
Major: 1,
|
|
Minor: 7,
|
|
Permissions: "rwm",
|
|
Allow: true,
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
// Create a "container" within the "pods" cgroup.
|
|
// This is not a real container, just a process in the cgroup.
|
|
cmd := exec.Command("bash", "-c", "read; echo > /dev/full; cat /dev/null; true")
|
|
cmd.Env = append(os.Environ(), "LANG=C")
|
|
stdinR, stdinW, err := os.Pipe()
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
cmd.Stdin = stdinR
|
|
var stderr bytes.Buffer
|
|
cmd.Stderr = &stderr
|
|
err = cmd.Start()
|
|
stdinR.Close()
|
|
defer stdinW.Close()
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
// Make sure to not leave a zombie.
|
|
defer func() {
|
|
// These may fail, we don't care.
|
|
_, _ = stdinW.WriteString("hey\n")
|
|
_ = cmd.Wait()
|
|
}()
|
|
|
|
// Put the process into a cgroup.
|
|
m := newManager(config)
|
|
defer m.Destroy() //nolint:errcheck
|
|
|
|
if err := m.Apply(cmd.Process.Pid); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
// Check that we put the "container" into the "pod" cgroup.
|
|
if !strings.HasPrefix(m.Path("devices"), pm.Path("devices")) {
|
|
t.Fatalf("expected container cgroup path %q to be under pod cgroup path %q",
|
|
m.Path("devices"), pm.Path("devices"))
|
|
}
|
|
if err := m.Set(config.Resources); err != nil {
|
|
// failed to write "c 1:7 rwm": write /sys/fs/cgroup/devices/system.slice/system-runc_test_pods.slice/test-SkipDevices.scope/devices.allow: operation not permitted
|
|
if skipDevices == false && strings.HasSuffix(err.Error(), "/devices.allow: operation not permitted") {
|
|
// Cgroup v1 devices controller gives EPERM on trying
|
|
// to enable devices that are not enabled
|
|
// (skipDevices=false) in a parent cgroup.
|
|
// If this happens, test is passing.
|
|
return
|
|
}
|
|
t.Fatal(err)
|
|
}
|
|
|
|
// Check that we can access /dev/full but not /dev/zero.
|
|
if _, err := stdinW.WriteString("wow\n"); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if err := cmd.Wait(); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
for _, exp := range expected {
|
|
if !strings.Contains(stderr.String(), exp) {
|
|
t.Errorf("expected %q, got: %s", exp, stderr.String())
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestSkipDevicesTrue(t *testing.T) {
|
|
testSkipDevices(t, true, []string{
|
|
"echo: write error: No space left on device",
|
|
"cat: /dev/null: Operation not permitted",
|
|
})
|
|
}
|
|
|
|
func TestSkipDevicesFalse(t *testing.T) {
|
|
// If SkipDevices is not set for the parent slice, access to both
|
|
// devices should fail. This is done to assess the test correctness.
|
|
// For cgroup v1, we check for m.Set returning EPERM.
|
|
// For cgroup v2, we check for the errors below.
|
|
testSkipDevices(t, false, []string{
|
|
"/dev/full: Operation not permitted",
|
|
"cat: /dev/null: Operation not permitted",
|
|
})
|
|
}
|