mirror of
https://github.com/opencontainers/runc.git
synced 2025-09-26 19:41:35 +08:00

Instead of having every test helper binary in its own directory, let's use /tests/cmd/_bin as a destination directory. This allows for simpler setup/cleanup. Signed-off-by: Kir Kolyshkin <kolyshkin@gmail.com>
875 lines
23 KiB
Bash
Executable File
875 lines
23 KiB
Bash
Executable File
#!/bin/bash
|
|
|
|
set -u
|
|
|
|
bats_require_minimum_version 1.5.0
|
|
|
|
# Root directory of integration tests.
|
|
INTEGRATION_ROOT=$(dirname "$(readlink -f "${BASH_SOURCE[0]}")")
|
|
|
|
# Download images, get *_IMAGE variables.
|
|
IMAGES=$("${INTEGRATION_ROOT}"/get-images.sh)
|
|
eval "$IMAGES"
|
|
unset IMAGES
|
|
|
|
: "${RUNC:="${INTEGRATION_ROOT}/../../runc"}"
|
|
|
|
# Path to binaries compiled from packages in tests/cmd by "make test-binaries").
|
|
TESTBINDIR=${INTEGRATION_ROOT}/../cmd/_bin
|
|
|
|
# Some variables may not always be set. Set those to empty value,
|
|
# if unset, to avoid "unbound variable" error.
|
|
: "${ROOTLESS_FEATURES:=}"
|
|
|
|
# Test data path.
|
|
# shellcheck disable=SC2034
|
|
TESTDATA="${INTEGRATION_ROOT}/testdata"
|
|
|
|
# Kernel version
|
|
KERNEL_VERSION="$(uname -r)"
|
|
KERNEL_MAJOR="${KERNEL_VERSION%%.*}"
|
|
KERNEL_MINOR="${KERNEL_VERSION#"$KERNEL_MAJOR".}"
|
|
KERNEL_MINOR="${KERNEL_MINOR%%.*}"
|
|
|
|
ARCH=$(uname -m)
|
|
|
|
# Seccomp agent socket.
|
|
SECCCOMP_AGENT_SOCKET="$BATS_TMPDIR/seccomp-agent.sock"
|
|
|
|
# Wrapper for runc.
|
|
function runc() {
|
|
run __runc "$@"
|
|
|
|
# Some debug information to make life easier. bats will only print it if the
|
|
# test failed, in which case the output is useful.
|
|
# shellcheck disable=SC2154
|
|
echo "$(basename "$RUNC") $* (status=$status):" >&2
|
|
# shellcheck disable=SC2154
|
|
echo "$output" >&2
|
|
}
|
|
|
|
# Raw wrapper for runc.
|
|
function __runc() {
|
|
"$RUNC" ${RUNC_USE_SYSTEMD+--systemd-cgroup} \
|
|
${ROOT:+--root "$ROOT/state"} "$@"
|
|
}
|
|
|
|
# Wrapper for runc spec.
|
|
function runc_spec() {
|
|
local rootless=""
|
|
[ $EUID -ne 0 ] && rootless="--rootless"
|
|
|
|
runc spec $rootless
|
|
|
|
# Always add additional mappings if we have idmaps.
|
|
if [[ $EUID -ne 0 && "$ROOTLESS_FEATURES" == *"idmap"* ]]; then
|
|
runc_rootless_idmap
|
|
fi
|
|
}
|
|
|
|
# Helper function to reformat config.json file. Input uses jq syntax.
|
|
function update_config() {
|
|
jq "$@" "./config.json" | awk 'BEGIN{RS="";getline<"-";print>ARGV[1]}' "./config.json"
|
|
}
|
|
|
|
# Shortcut to add additional uids and gids, based on the values set as part of
|
|
# a rootless configuration.
|
|
function runc_rootless_idmap() {
|
|
update_config ' .mounts |= map((select(.type == "devpts") | .options += ["gid=5"]) // .)
|
|
| .linux.uidMappings += [{"hostID": '"$ROOTLESS_UIDMAP_START"', "containerID": 1000, "size": '"$ROOTLESS_UIDMAP_LENGTH"'}]
|
|
| .linux.gidMappings += [{"hostID": '"$ROOTLESS_GIDMAP_START"', "containerID": 100, "size": 1}]
|
|
| .linux.gidMappings += [{"hostID": '"$((ROOTLESS_GIDMAP_START + 10))"', "containerID": 1, "size": 20}]
|
|
| .linux.gidMappings += [{"hostID": '"$((ROOTLESS_GIDMAP_START + 100))"', "containerID": 1000, "size": '"$((ROOTLESS_GIDMAP_LENGTH - 1000))"'}]'
|
|
}
|
|
|
|
# Returns systemd version as a number (-1 if systemd is not enabled/supported).
|
|
function systemd_version() {
|
|
if [ -v RUNC_USE_SYSTEMD ]; then
|
|
systemctl --version | awk '/^systemd / {print $2; exit}'
|
|
return
|
|
fi
|
|
|
|
echo "-1"
|
|
}
|
|
|
|
function init_cgroup_paths() {
|
|
# init once
|
|
[[ -v CGROUP_V1 || -v CGROUP_V2 ]] && return
|
|
|
|
if stat -f -c %t /sys/fs/cgroup | grep -qFw 63677270; then
|
|
CGROUP_V2=yes
|
|
local controllers="/sys/fs/cgroup/cgroup.controllers"
|
|
# For rootless + systemd case, controllers delegation is required,
|
|
# so check the controllers that the current user has, not the top one.
|
|
# NOTE: delegation of cpuset requires systemd >= 244 (Fedora >= 32, Ubuntu >= 20.04).
|
|
if [[ $EUID -ne 0 && -v RUNC_USE_SYSTEMD ]]; then
|
|
controllers="/sys/fs/cgroup/user.slice/user-${UID}.slice/user@${UID}.service/cgroup.controllers"
|
|
fi
|
|
|
|
# "pseudo" controllers do not appear in /sys/fs/cgroup/cgroup.controllers.
|
|
# - devices (since kernel 4.15) we must assume to be supported because
|
|
# it's quite hard to test.
|
|
# - freezer (since kernel 5.2) we can auto-detect by looking for the
|
|
# "cgroup.freeze" file a *non-root* cgroup.
|
|
CGROUP_SUBSYSTEMS=$(
|
|
cat "$controllers"
|
|
echo devices
|
|
)
|
|
CGROUP_BASE_PATH=/sys/fs/cgroup
|
|
|
|
# Find any cgroup.freeze files...
|
|
if [ -n "$(find "$CGROUP_BASE_PATH" -maxdepth 2 -type f -name "cgroup.freeze" -print -quit)" ]; then
|
|
CGROUP_SUBSYSTEMS+=" freezer"
|
|
fi
|
|
else
|
|
if stat -f -c %t /sys/fs/cgroup/unified 2>/dev/null | grep -qFw 63677270; then
|
|
CGROUP_HYBRID=yes
|
|
fi
|
|
CGROUP_V1=yes
|
|
CGROUP_SUBSYSTEMS=$(awk '!/^#/ {print $1}' /proc/cgroups)
|
|
local g base_path
|
|
for g in ${CGROUP_SUBSYSTEMS}; do
|
|
# This uses gawk-specific feature (\< ... \>).
|
|
base_path=$(gawk '$(NF-2) == "cgroup" && $NF ~ /\<'"${g}"'\>/ { print $5; exit }' /proc/self/mountinfo)
|
|
test -z "$base_path" && continue
|
|
eval CGROUP_"${g^^}"_BASE_PATH="${base_path}"
|
|
done
|
|
fi
|
|
}
|
|
|
|
function create_parent() {
|
|
if [ -v RUNC_USE_SYSTEMD ]; then
|
|
[ ! -v SD_PARENT_NAME ] && return
|
|
"$TESTBINDIR/sd-helper" --parent machine.slice start "$SD_PARENT_NAME"
|
|
else
|
|
[ ! -v REL_PARENT_PATH ] && return
|
|
if [ -v CGROUP_V2 ]; then
|
|
mkdir "/sys/fs/cgroup$REL_PARENT_PATH"
|
|
else
|
|
local subsys
|
|
for subsys in ${CGROUP_SUBSYSTEMS}; do
|
|
# Have to ignore EEXIST (-p) as some subsystems
|
|
# are mounted together (e.g. cpu,cpuacct), so
|
|
# the path is created more than once.
|
|
mkdir -p "/sys/fs/cgroup/$subsys$REL_PARENT_PATH"
|
|
done
|
|
fi
|
|
fi
|
|
}
|
|
|
|
function remove_parent() {
|
|
if [ -v RUNC_USE_SYSTEMD ]; then
|
|
[ ! -v SD_PARENT_NAME ] && return
|
|
"$TESTBINDIR/sd-helper" --parent machine.slice stop "$SD_PARENT_NAME"
|
|
else
|
|
[ ! -v REL_PARENT_PATH ] && return
|
|
if [ -v CGROUP_V2 ]; then
|
|
rmdir "/sys/fs/cgroup/$REL_PARENT_PATH"
|
|
else
|
|
local subsys
|
|
for subsys in ${CGROUP_SUBSYSTEMS} systemd; do
|
|
rmdir "/sys/fs/cgroup/$subsys/$REL_PARENT_PATH"
|
|
done
|
|
fi
|
|
fi
|
|
unset SD_PARENT_NAME
|
|
unset REL_PARENT_PATH
|
|
}
|
|
|
|
function set_parent_systemd_properties() {
|
|
[ ! -v SD_PARENT_NAME ] && return
|
|
local user=""
|
|
[ $EUID -ne 0 ] && user="--user"
|
|
systemctl set-property $user "$SD_PARENT_NAME" "$@"
|
|
}
|
|
|
|
# Randomize cgroup path(s), and update cgroupsPath in config.json.
|
|
# This function also sets a few cgroup-related variables that are used
|
|
# by other cgroup-related functions.
|
|
#
|
|
# If this function is not called (and cgroupsPath is not set in config),
|
|
# runc uses default container's cgroup path derived from the container's name
|
|
# (except for rootless containers, that have no default cgroup path).
|
|
#
|
|
# Optional parameter $1 is a pod/parent name. If set, a parent/pod cgroup is
|
|
# created, and variables $REL_PARENT_PATH and $SD_PARENT_NAME can be used to
|
|
# refer to it.
|
|
function set_cgroups_path() {
|
|
init_cgroup_paths
|
|
local pod dash_pod="" slash_pod="" pod_slice=""
|
|
if [ "$#" -ne 0 ] && [ "$1" != "" ]; then
|
|
# Set up a parent/pod cgroup.
|
|
pod="$1"
|
|
dash_pod="-$pod"
|
|
slash_pod="/$pod"
|
|
SD_PARENT_NAME="machine-${pod}.slice"
|
|
pod_slice="/$SD_PARENT_NAME"
|
|
fi
|
|
|
|
local rnd="$RANDOM"
|
|
if [ -v RUNC_USE_SYSTEMD ]; then
|
|
SD_UNIT_NAME="runc-cgroups-integration-test-${rnd}.scope"
|
|
if [ $EUID -eq 0 ]; then
|
|
REL_PARENT_PATH="/machine.slice${pod_slice}"
|
|
OCI_CGROUPS_PATH="machine${dash_pod}.slice:runc-cgroups:integration-test-${rnd}"
|
|
else
|
|
REL_PARENT_PATH="/user.slice/user-${UID}.slice/user@${UID}.service/machine.slice${pod_slice}"
|
|
# OCI path doesn't contain "/user.slice/user-${UID}.slice/user@${UID}.service/" prefix
|
|
OCI_CGROUPS_PATH="machine${dash_pod}.slice:runc-cgroups:integration-test-${rnd}"
|
|
fi
|
|
REL_CGROUPS_PATH="$REL_PARENT_PATH/$SD_UNIT_NAME"
|
|
else
|
|
REL_PARENT_PATH="/runc-cgroups-integration-test${slash_pod}"
|
|
REL_CGROUPS_PATH="$REL_PARENT_PATH/test-cgroup-${rnd}"
|
|
OCI_CGROUPS_PATH=$REL_CGROUPS_PATH
|
|
fi
|
|
|
|
# Absolute path to container's cgroup v2.
|
|
if [ -v CGROUP_V2 ]; then
|
|
CGROUP_V2_PATH=${CGROUP_BASE_PATH}${REL_CGROUPS_PATH}
|
|
fi
|
|
|
|
[ -v pod ] && create_parent
|
|
|
|
update_config '.linux.cgroupsPath |= "'"${OCI_CGROUPS_PATH}"'"'
|
|
}
|
|
|
|
# Get a path to cgroup directory, based on controller name.
|
|
# Parameters:
|
|
# $1: controller name (like "pids") or a file name (like "pids.max").
|
|
function get_cgroup_path() {
|
|
if [ -v CGROUP_V2 ]; then
|
|
echo "$CGROUP_V2_PATH"
|
|
return
|
|
fi
|
|
|
|
local var cgroup
|
|
var=${1%%.*} # controller name (e.g. memory)
|
|
var=CGROUP_${var^^}_BASE_PATH # variable name (e.g. CGROUP_MEMORY_BASE_PATH)
|
|
eval cgroup=\$"${var}${REL_CGROUPS_PATH}"
|
|
echo "$cgroup"
|
|
}
|
|
|
|
# Get a value from a cgroup file.
|
|
function get_cgroup_value() {
|
|
local cgroup
|
|
cgroup="$(get_cgroup_path "$1")"
|
|
cat "$cgroup/$1"
|
|
}
|
|
|
|
# Check if a value in a cgroup file $1 matches $2 or $3 (if specified).
|
|
function check_cgroup_value() {
|
|
local got
|
|
got="$(get_cgroup_value "$1")"
|
|
local want=$2
|
|
local want2="${3:-}"
|
|
|
|
echo "$1: got $got, want $want $want2"
|
|
[ "$got" = "$want" ] || [[ -n "$want2" && "$got" = "$want2" ]]
|
|
}
|
|
|
|
# Check if a value of systemd unit property $1 matches $2 or $3 (if specified).
|
|
function check_systemd_value() {
|
|
[ ! -v RUNC_USE_SYSTEMD ] && return
|
|
local source="$1"
|
|
[ "$source" = "unsupported" ] && return
|
|
local want="$2"
|
|
local want2="${3:-}"
|
|
local user=""
|
|
[ $EUID -ne 0 ] && user="--user"
|
|
|
|
got=$(systemctl show $user --property "$source" "$SD_UNIT_NAME" | awk -F= '{print $2}')
|
|
echo "systemd $source: got $got, want $want $want2"
|
|
[ "$got" = "$want" ] || [[ -n "$want2" && "$got" = "$want2" ]]
|
|
}
|
|
|
|
function check_cpu_quota() {
|
|
local quota=$1
|
|
local period=$2
|
|
local sd_quota=$3
|
|
|
|
if [ -v CGROUP_V2 ]; then
|
|
if [ "$quota" = "-1" ]; then
|
|
quota="max"
|
|
fi
|
|
check_cgroup_value "cpu.max" "$quota $period"
|
|
else
|
|
check_cgroup_value "cpu.cfs_quota_us" "$quota"
|
|
check_cgroup_value "cpu.cfs_period_us" "$period"
|
|
fi
|
|
# systemd values are the same for v1 and v2
|
|
check_systemd_value "CPUQuotaPerSecUSec" "$sd_quota"
|
|
|
|
# CPUQuotaPeriodUSec requires systemd >= v242
|
|
[ "$(systemd_version)" -lt 242 ] && return
|
|
|
|
local sd_period=$((period / 1000))ms
|
|
[ "$sd_period" = "1000ms" ] && sd_period="1s"
|
|
local sd_infinity=""
|
|
# 100ms is the default value, and if not set, shown as infinity
|
|
[ "$sd_period" = "100ms" ] && sd_infinity="infinity"
|
|
check_systemd_value "CPUQuotaPeriodUSec" $sd_period $sd_infinity
|
|
}
|
|
|
|
function check_cpu_burst() {
|
|
local burst=$1
|
|
if [ -v CGROUP_V2 ]; then
|
|
# Due to a kernel bug (fixed by commit 49217ea147df, see
|
|
# https://lore.kernel.org/all/20240424132438.514720-1-serein.chengyu@huawei.com/),
|
|
# older kernels printed value divided by 1000. Check for both.
|
|
check_cgroup_value "cpu.max.burst" "$burst" "$((burst / 1000))"
|
|
else
|
|
check_cgroup_value "cpu.cfs_burst_us" "$burst"
|
|
fi
|
|
}
|
|
|
|
# Works for cgroup v1 and v2, accepts v1 shares as an argument.
|
|
function check_cpu_shares() {
|
|
local shares=$1
|
|
|
|
if [ -v CGROUP_V2 ]; then
|
|
local weight=$((1 + ((shares - 2) * 9999) / 262142))
|
|
check_cpu_weight "$weight"
|
|
else
|
|
check_cgroup_value "cpu.shares" "$shares"
|
|
check_systemd_value "CPUShares" "$shares"
|
|
fi
|
|
}
|
|
|
|
# Works only for cgroup v2, accept v2 weight.
|
|
function check_cpu_weight() {
|
|
local weight=$1
|
|
|
|
check_cgroup_value "cpu.weight" "$weight"
|
|
check_systemd_value "CPUWeight" "$weight"
|
|
}
|
|
|
|
# Helper function to set a resources limit
|
|
function set_resources_limit() {
|
|
update_config '.linux.resources.pids.limit |= 100'
|
|
}
|
|
|
|
# Helper function to make /sys/fs/cgroup writable
|
|
function set_cgroup_mount_writable() {
|
|
update_config '.mounts |= map((select(.type == "cgroup") | .options -= ["ro"]) // .)'
|
|
}
|
|
|
|
# Fails the current test, providing the error given.
|
|
function fail() {
|
|
echo "$@" >&2
|
|
exit 1
|
|
}
|
|
|
|
# Check whether rootless runc can use cgroups.
|
|
function rootless_cgroup() {
|
|
[[ "$ROOTLESS_FEATURES" == *"cgroup"* || -v RUNC_USE_SYSTEMD ]]
|
|
}
|
|
|
|
function in_userns() {
|
|
# The kernel guarantees the root userns inode number (and thus the value of
|
|
# the magic-link) is always the same value (PROC_USER_INIT_INO).
|
|
[[ "$(readlink /proc/self/ns/user)" != "user:[$((0xEFFFFFFD))]" ]]
|
|
}
|
|
|
|
function can_fsopen() {
|
|
fstype="$1"
|
|
|
|
# At the very least you need 5.1 for fsopen() and the filesystem needs to
|
|
# be supported by the running kernel.
|
|
if ! is_kernel_gte 5.1 || ! grep -qFw "$fstype" /proc/filesystems; then
|
|
return 1
|
|
fi
|
|
|
|
# You need to be root to use fsopen.
|
|
if [ "$EUID" -ne 0 ]; then
|
|
return 1
|
|
fi
|
|
|
|
# If we're root in the initial userns, we're done.
|
|
if ! in_userns; then
|
|
return 0
|
|
fi
|
|
|
|
# If we are running in a userns, then the filesystem needs to support
|
|
# FS_USERNS_MOUNT, which is a per-filesystem flag that depends on the
|
|
# kernel version.
|
|
case "$fstype" in
|
|
overlay)
|
|
# 459c7c565ac3 ("ovl: unprivieged mounts")
|
|
is_kernel_gte 5.11 || return 2
|
|
;;
|
|
fuse)
|
|
# 4ad769f3c346 ("fuse: Allow fully unprivileged mounts")
|
|
is_kernel_gte 4.18 || return 2
|
|
;;
|
|
ramfs | tmpfs)
|
|
# b3c6761d9b5c ("userns: Allow the userns root to mount ramfs.")
|
|
# 2b8576cb09a7 ("userns: Allow the userns root to mount tmpfs.")
|
|
is_kernel_gte 3.9 || return 2
|
|
;;
|
|
*)
|
|
# If we don't know about the filesystem, return an error.
|
|
fail "can_fsopen: unknown filesystem $fstype"
|
|
;;
|
|
esac
|
|
}
|
|
|
|
# Check if criu is available and working.
|
|
function have_criu() {
|
|
command -v criu &>/dev/null || return 1
|
|
|
|
# Workaround for https://github.com/opencontainers/runc/issues/3532.
|
|
local ver
|
|
ver=$(rpm -q criu 2>/dev/null || true)
|
|
run ! grep -q '^criu-3\.17-[123]\.el9' <<<"$ver"
|
|
}
|
|
|
|
# Allows a test to specify what things it requires. If the environment can't
|
|
# support it, the test is skipped with a message.
|
|
function requires() {
|
|
for var in "$@"; do
|
|
local skip_me
|
|
case $var in
|
|
criu)
|
|
if ! have_criu; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
criu_feature_*)
|
|
var=${var#criu_feature_}
|
|
if ! criu check --feature "$var"; then
|
|
skip "requires CRIU feature ${var}"
|
|
fi
|
|
;;
|
|
root)
|
|
if [ $EUID -ne 0 ] || in_userns; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
rootless)
|
|
if [ $EUID -eq 0 ]; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
rootless_idmap)
|
|
if [[ "$ROOTLESS_FEATURES" != *"idmap"* ]]; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
rootless_cgroup)
|
|
if ! rootless_cgroup; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
rootless_no_cgroup)
|
|
if rootless_cgroup; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
rootless_no_features)
|
|
if [ -n "$ROOTLESS_FEATURES" ]; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
cgroups_rt)
|
|
init_cgroup_paths
|
|
if [ ! -e "${CGROUP_CPU_BASE_PATH}/cpu.rt_period_us" ]; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
cgroups_swap)
|
|
init_cgroup_paths
|
|
if [ -v CGROUP_V1 ]; then
|
|
if [ ! -e "${CGROUP_MEMORY_BASE_PATH}/memory.memsw.limit_in_bytes" ]; then
|
|
skip_me=1
|
|
fi
|
|
elif [ -v CGROUP_V2 ]; then
|
|
if [ -z "$(find "$CGROUP_BASE_PATH" -maxdepth 2 -type f -name memory.swap.max -print -quit)" ]; then
|
|
skip_me=1
|
|
fi
|
|
fi
|
|
;;
|
|
cgroups_cpu_idle)
|
|
local p
|
|
init_cgroup_paths
|
|
[ -v CGROUP_V1 ] && p="$CGROUP_CPU_BASE_PATH"
|
|
[ -v CGROUP_V2 ] && p="$CGROUP_BASE_PATH"
|
|
if [ -z "$(find "$p" -maxdepth 2 -type f -name cpu.idle -print -quit)" ]; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
cgroups_cpu_burst)
|
|
local p f
|
|
init_cgroup_paths
|
|
if [ -v CGROUP_V1 ]; then
|
|
p="$CGROUP_CPU_BASE_PATH"
|
|
f="cpu.cfs_burst_us"
|
|
elif [ -v CGROUP_V2 ]; then
|
|
# https://github.com/torvalds/linux/commit/f4183717b370ad28dd0c0d74760142b20e6e7931
|
|
requires_kernel 5.14
|
|
p="$CGROUP_BASE_PATH"
|
|
f="cpu.max.burst"
|
|
fi
|
|
if [ -z "$(find "$p" -maxdepth 2 -type f -name "$f" -print -quit)" ]; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
cgroups_io_weight)
|
|
local p f1 f2
|
|
init_cgroup_paths
|
|
if [ -v CGROUP_V1 ]; then
|
|
p="$CGROUP_CPU_BASE_PATH"
|
|
f1="blkio.weight"
|
|
f2="blkio.bfq.weight"
|
|
elif [ -v CGROUP_V2 ]; then
|
|
p="$CGROUP_BASE_PATH"
|
|
f1="io.weight"
|
|
f2="io.bfq.weight"
|
|
fi
|
|
if [ -z "$(find "$p" -type f \( -name "$f1" -o -name "$f2" \) -print -quit)" ]; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
cgroupns)
|
|
if [ ! -e "/proc/self/ns/cgroup" ]; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
timens)
|
|
if [ ! -e "/proc/self/ns/time" ]; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
cgroups_v1)
|
|
init_cgroup_paths
|
|
if [ ! -v CGROUP_V1 ]; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
cgroups_v2)
|
|
init_cgroup_paths
|
|
if [ ! -v CGROUP_V2 ]; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
cgroups_hybrid)
|
|
init_cgroup_paths
|
|
if [ ! -v CGROUP_HYBRID ]; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
cgroups_*)
|
|
init_cgroup_paths
|
|
var=${var#cgroups_}
|
|
if [[ "$CGROUP_SUBSYSTEMS" != *"$var"* ]]; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
smp)
|
|
local cpus
|
|
cpus=$(grep -c '^processor' /proc/cpuinfo)
|
|
if [ "$cpus" -lt 2 ]; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
systemd)
|
|
if [ ! -v RUNC_USE_SYSTEMD ]; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
systemd_v*)
|
|
var=${var#systemd_v}
|
|
if [ "$(systemd_version)" -lt "$var" ]; then
|
|
skip "requires systemd >= v${var}"
|
|
fi
|
|
;;
|
|
no_systemd)
|
|
if [ -v RUNC_USE_SYSTEMD ]; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
arch_x86_64)
|
|
if [ "$ARCH" != "x86_64" ]; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
more_than_8_core)
|
|
local cpus
|
|
cpus=$(grep -c '^processor' /proc/cpuinfo)
|
|
if [ "$cpus" -le 8 ]; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
psi)
|
|
# If PSI is not compiled in the kernel, the file will not exist.
|
|
# If PSI is compiled, but not enabled, read will fail with ENOTSUPP.
|
|
if ! cat /sys/fs/cgroup/cpu.pressure &>/dev/null; then
|
|
skip_me=1
|
|
fi
|
|
;;
|
|
*)
|
|
fail "BUG: Invalid requires $var."
|
|
;;
|
|
esac
|
|
if [ -v skip_me ]; then
|
|
skip "test requires $var"
|
|
fi
|
|
done
|
|
}
|
|
|
|
# Allow a test to specify that it will not work properly on a given OS. The
|
|
# fingerprint for the OS used for this test is $ID-$VERSION_ID, using the
|
|
# variables in /etc/os-release. The arguments are regular expressions, and any
|
|
# match will cause the test to be skipped.
|
|
function exclude_os() {
|
|
local host
|
|
host="$(sh -c '. /etc/os-release ; echo "$ID-$VERSION_ID"')"
|
|
for bad_os in "$@"; do
|
|
if [[ "$host" =~ ^$bad_os$ ]]; then
|
|
skip "test doesn't work on $bad_os"
|
|
fi
|
|
done
|
|
}
|
|
|
|
# Retry a command $1 times until it succeeds. Wait $2 seconds between retries.
|
|
function retry() {
|
|
local attempts=$1
|
|
shift
|
|
local delay=$1
|
|
shift
|
|
local i
|
|
|
|
for ((i = 0; i < attempts; i++)); do
|
|
run "$@"
|
|
if [[ "$status" -eq 0 ]]; then
|
|
return 0
|
|
fi
|
|
sleep "$delay"
|
|
done
|
|
|
|
echo "Command \"$*\" failed $attempts times. Output: $output"
|
|
false
|
|
}
|
|
|
|
# retry until the given container has state
|
|
function wait_for_container() {
|
|
if [ $# -eq 3 ]; then
|
|
retry "$1" "$2" __runc state "$3"
|
|
elif [ $# -eq 4 ]; then
|
|
retry "$1" "$2" eval "__runc state $3 | grep -qw $4"
|
|
else
|
|
echo "Usage: wait_for_container ATTEMPTS DELAY ID [STATUS]" 1>&2
|
|
return 1
|
|
fi
|
|
}
|
|
|
|
function testcontainer() {
|
|
# test state of container
|
|
runc state "$1"
|
|
if [ "$2" = "checkpointed" ]; then
|
|
[ "$status" -eq 1 ]
|
|
return
|
|
fi
|
|
[ "$status" -eq 0 ]
|
|
[[ "${output}" == *"$2"* ]]
|
|
}
|
|
|
|
# Check that all the listed processes are gone. Use after kill/stop etc.
|
|
function wait_pids_gone() {
|
|
if [ $# -lt 3 ]; then
|
|
echo "Usage: wait_pids_gone ITERATIONS SLEEP PID [PID ...]"
|
|
return 1
|
|
fi
|
|
local iter=$1
|
|
shift
|
|
local sleep=$1
|
|
shift
|
|
local pids=("$@")
|
|
|
|
while true; do
|
|
for i in "${!pids[@]}"; do
|
|
# Check if the pid is there; if not, remove it from the list.
|
|
kill -0 "${pids[i]}" 2>/dev/null || unset "pids[i]"
|
|
done
|
|
[ ${#pids[@]} -eq 0 ] && return 0
|
|
# Rebuild pids array to avoid sparse array issues.
|
|
pids=("${pids[@]}")
|
|
|
|
((--iter > 0)) || break
|
|
|
|
sleep "$sleep"
|
|
done
|
|
|
|
echo "Expected all PIDs to be gone, but some are still there:" "${pids[@]}" 1>&2
|
|
return 1
|
|
}
|
|
|
|
function setup_recvtty() {
|
|
[ ! -v ROOT ] && return 1 # must not be called without ROOT set
|
|
local dir="$ROOT/tty"
|
|
|
|
mkdir "$dir"
|
|
export CONSOLE_SOCKET="$dir/sock"
|
|
|
|
# We need to start recvtty in the background, so we double fork in the shell.
|
|
("$TESTBINDIR/recvtty" --pid-file "$dir/pid" --mode null "$CONSOLE_SOCKET" &) &
|
|
}
|
|
|
|
function teardown_recvtty() {
|
|
[ ! -v ROOT ] && return 0 # nothing to teardown
|
|
local dir="$ROOT/tty"
|
|
|
|
# When we kill recvtty, the container will also be killed.
|
|
if [ -f "$dir/pid" ]; then
|
|
kill -9 "$(cat "$dir/pid")"
|
|
fi
|
|
|
|
# Clean up the files that might be left over.
|
|
rm -rf "$dir"
|
|
}
|
|
|
|
function setup_seccompagent() {
|
|
("$TESTBINDIR/seccompagent" -socketfile="$SECCCOMP_AGENT_SOCKET" -pid-file "$BATS_TMPDIR/seccompagent.pid" &) &
|
|
}
|
|
|
|
function teardown_seccompagent() {
|
|
if [ -f "$BATS_TMPDIR/seccompagent.pid" ]; then
|
|
kill -9 "$(cat "$BATS_TMPDIR/seccompagent.pid")"
|
|
fi
|
|
rm -f "$BATS_TMPDIR/seccompagent.pid"
|
|
rm -f "$SECCCOMP_AGENT_SOCKET"
|
|
}
|
|
|
|
function setup_bundle() {
|
|
local image="$1"
|
|
|
|
# Root for various container directories (state, tty, bundle).
|
|
ROOT=$(mktemp -d "$BATS_RUN_TMPDIR/runc.XXXXXX")
|
|
mkdir -p "$ROOT/state" "$ROOT/bundle/rootfs"
|
|
|
|
# Directories created by mktemp -d have 0700 permission bits. Tests
|
|
# running inside userns (see userns.bats) need to access the directory
|
|
# as a different user to mount the rootfs. Since kernel v5.12, parent
|
|
# directories are also checked. Give a+x for these tests to work.
|
|
chmod a+x "$ROOT" "$BATS_RUN_TMPDIR"
|
|
|
|
setup_recvtty
|
|
cd "$ROOT/bundle" || return
|
|
|
|
tar --exclude './dev/*' -C rootfs -xf "$image"
|
|
|
|
runc_spec
|
|
}
|
|
|
|
function setup_busybox() {
|
|
setup_bundle "$BUSYBOX_IMAGE"
|
|
}
|
|
|
|
function setup_debian() {
|
|
setup_bundle "$DEBIAN_IMAGE"
|
|
}
|
|
|
|
function teardown_bundle() {
|
|
[ ! -v ROOT ] && return 0 # nothing to teardown
|
|
|
|
cd "$INTEGRATION_ROOT" || return
|
|
echo "--- teardown ---" >&2
|
|
|
|
teardown_recvtty
|
|
local ct
|
|
for ct in $(__runc list -q); do
|
|
__runc delete -f "$ct"
|
|
done
|
|
rm -rf "$ROOT"
|
|
remove_parent
|
|
}
|
|
|
|
function remap_rootfs() {
|
|
[ ! -v ROOT ] && return 0 # nothing to remap
|
|
|
|
"$TESTBINDIR/remap-rootfs" "$ROOT/bundle"
|
|
}
|
|
|
|
function is_kernel_gte() {
|
|
local major_required minor_required
|
|
major_required=$(echo "$1" | cut -d. -f1)
|
|
minor_required=$(echo "$1" | cut -d. -f2)
|
|
[[ "$KERNEL_MAJOR" -gt $major_required || ("$KERNEL_MAJOR" -eq $major_required && "$KERNEL_MINOR" -ge $minor_required) ]]
|
|
}
|
|
|
|
function requires_kernel() {
|
|
if ! is_kernel_gte "$@"; then
|
|
skip "requires kernel >= $1"
|
|
fi
|
|
}
|
|
|
|
function requires_idmap_fs() {
|
|
local fs
|
|
fs=$1
|
|
|
|
# We need to "|| true" it to avoid CI failure as this binary may return with
|
|
# something different than 0.
|
|
stderr=$("$TESTBINDIR/fs-idmap" "$fs" 2>&1 >/dev/null || true)
|
|
|
|
case $stderr in
|
|
*invalid\ argument)
|
|
skip "$fs underlying file system does not support ID map mounts"
|
|
;;
|
|
*operation\ not\ permitted)
|
|
if uname -r | grep -q el9; then
|
|
# Older EL9 kernels did not permit using ID map mounts
|
|
# due to a specific patch added to their sources:
|
|
# https://gitlab.com/redhat/centos-stream/src/kernel/centos-stream-9/-/merge_requests/131
|
|
#
|
|
# That patch was reverted in:
|
|
# https://gitlab.com/redhat/centos-stream/src/kernel/centos-stream-9/-/merge_requests/2179
|
|
#
|
|
# The above revert is included into the kernel 5.14.0-334.el9.
|
|
skip "Needs kernel >= 5.14.0-334.el9"
|
|
fi
|
|
;;
|
|
esac
|
|
# If we have another error, the integration test will fail and report it.
|
|
}
|
|
|
|
# setup_pidfd_kill runs pidfd-kill process in background and receives the
|
|
# SIGTERM as signal to send the given signal to init process.
|
|
function setup_pidfd_kill() {
|
|
local signal=$1
|
|
|
|
[ ! -v ROOT ] && return 1
|
|
local dir="${ROOT}/pidfd"
|
|
|
|
mkdir "${dir}"
|
|
export PIDFD_SOCKET="${dir}/sock"
|
|
|
|
("$TESTBINDIR/pidfd-kill" --pid-file "${dir}/pid" --signal "${signal}" "${PIDFD_SOCKET}" &) &
|
|
|
|
# ensure socket is ready
|
|
retry 10 1 stat "${PIDFD_SOCKET}"
|
|
}
|
|
|
|
# teardown_pidfd_kill cleanups all the resources related to pidfd-kill.
|
|
function teardown_pidfd_kill() {
|
|
[ ! -v ROOT ] && return 0
|
|
|
|
local dir="${ROOT}/pidfd"
|
|
|
|
if [ -f "${dir}/pid" ]; then
|
|
kill -9 "$(cat "${dir}/pid")"
|
|
fi
|
|
|
|
rm -rf "${dir}"
|
|
}
|
|
|
|
# pidfd_kill sends the signal to init process.
|
|
function pidfd_kill() {
|
|
[ ! -v ROOT ] && return 0
|
|
|
|
local dir="${ROOT}/pidfd"
|
|
|
|
if [ -f "${dir}/pid" ]; then
|
|
kill "$(cat "${dir}/pid")"
|
|
fi
|
|
}
|