123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398 |
- /*
- Copyright 2016 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package kuberuntime
- import (
- "path/filepath"
- "testing"
- "github.com/stretchr/testify/assert"
- "github.com/stretchr/testify/require"
- "k8s.io/api/core/v1"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- utilfeature "k8s.io/apiserver/pkg/util/feature"
- featuregatetesting "k8s.io/component-base/featuregate/testing"
- runtimeapi "k8s.io/cri-api/pkg/apis/runtime/v1alpha2"
- runtimetesting "k8s.io/cri-api/pkg/apis/testing"
- "k8s.io/kubernetes/pkg/features"
- kubecontainer "k8s.io/kubernetes/pkg/kubelet/container"
- )
- func TestStableKey(t *testing.T) {
- container := &v1.Container{
- Name: "test_container",
- Image: "foo/image:v1",
- }
- pod := &v1.Pod{
- ObjectMeta: metav1.ObjectMeta{
- Name: "test_pod",
- Namespace: "test_pod_namespace",
- UID: "test_pod_uid",
- },
- Spec: v1.PodSpec{
- Containers: []v1.Container{*container},
- },
- }
- oldKey := getStableKey(pod, container)
- // Updating the container image should change the key.
- container.Image = "foo/image:v2"
- newKey := getStableKey(pod, container)
- assert.NotEqual(t, oldKey, newKey)
- }
- func TestToKubeContainer(t *testing.T) {
- c := &runtimeapi.Container{
- Id: "test-id",
- Metadata: &runtimeapi.ContainerMetadata{
- Name: "test-name",
- Attempt: 1,
- },
- Image: &runtimeapi.ImageSpec{Image: "test-image"},
- ImageRef: "test-image-ref",
- State: runtimeapi.ContainerState_CONTAINER_RUNNING,
- Annotations: map[string]string{
- containerHashLabel: "1234",
- },
- }
- expect := &kubecontainer.Container{
- ID: kubecontainer.ContainerID{
- Type: runtimetesting.FakeRuntimeName,
- ID: "test-id",
- },
- Name: "test-name",
- ImageID: "test-image-ref",
- Image: "test-image",
- Hash: uint64(0x1234),
- State: kubecontainer.ContainerStateRunning,
- }
- _, _, m, err := createTestRuntimeManager()
- assert.NoError(t, err)
- got, err := m.toKubeContainer(c)
- assert.NoError(t, err)
- assert.Equal(t, expect, got)
- }
- func TestGetImageUser(t *testing.T) {
- _, i, m, err := createTestRuntimeManager()
- assert.NoError(t, err)
- type image struct {
- name string
- uid *runtimeapi.Int64Value
- username string
- }
- type imageUserValues struct {
- // getImageUser can return (*int64)(nil) so comparing with *uid will break
- // type cannot be *int64 as Golang does not allow to take the address of a numeric constant"
- uid interface{}
- username string
- err error
- }
- tests := []struct {
- description string
- originalImage image
- expectedImageUserValues imageUserValues
- }{
- {
- "image without username and uid should return (new(int64), \"\", nil)",
- image{
- name: "test-image-ref1",
- uid: (*runtimeapi.Int64Value)(nil),
- username: "",
- },
- imageUserValues{
- uid: int64(0),
- username: "",
- err: nil,
- },
- },
- {
- "image with username and no uid should return ((*int64)nil, imageStatus.Username, nil)",
- image{
- name: "test-image-ref2",
- uid: (*runtimeapi.Int64Value)(nil),
- username: "testUser",
- },
- imageUserValues{
- uid: (*int64)(nil),
- username: "testUser",
- err: nil,
- },
- },
- {
- "image with uid should return (*int64, \"\", nil)",
- image{
- name: "test-image-ref3",
- uid: &runtimeapi.Int64Value{
- Value: 2,
- },
- username: "whatever",
- },
- imageUserValues{
- uid: int64(2),
- username: "",
- err: nil,
- },
- },
- }
- i.SetFakeImages([]string{"test-image-ref1", "test-image-ref2", "test-image-ref3"})
- for j, test := range tests {
- i.Images[test.originalImage.name].Username = test.originalImage.username
- i.Images[test.originalImage.name].Uid = test.originalImage.uid
- uid, username, err := m.getImageUser(test.originalImage.name)
- assert.NoError(t, err, "TestCase[%d]", j)
- if test.expectedImageUserValues.uid == (*int64)(nil) {
- assert.Equal(t, test.expectedImageUserValues.uid, uid, "TestCase[%d]", j)
- } else {
- assert.Equal(t, test.expectedImageUserValues.uid, *uid, "TestCase[%d]", j)
- }
- assert.Equal(t, test.expectedImageUserValues.username, username, "TestCase[%d]", j)
- }
- }
- func TestGetSeccompProfileFromAnnotations(t *testing.T) {
- _, _, m, err := createTestRuntimeManager()
- require.NoError(t, err)
- tests := []struct {
- description string
- annotation map[string]string
- containerName string
- expectedProfile string
- }{
- {
- description: "no seccomp should return empty string",
- expectedProfile: "",
- },
- {
- description: "no seccomp with containerName should return exmpty string",
- containerName: "container1",
- expectedProfile: "",
- },
- {
- description: "pod runtime/default seccomp profile should return runtime/default",
- annotation: map[string]string{
- v1.SeccompPodAnnotationKey: v1.SeccompProfileRuntimeDefault,
- },
- expectedProfile: v1.SeccompProfileRuntimeDefault,
- },
- {
- description: "pod docker/default seccomp profile should return docker/default",
- annotation: map[string]string{
- v1.SeccompPodAnnotationKey: v1.DeprecatedSeccompProfileDockerDefault,
- },
- expectedProfile: v1.DeprecatedSeccompProfileDockerDefault,
- },
- {
- description: "pod runtime/default seccomp profile with containerName should return runtime/default",
- annotation: map[string]string{
- v1.SeccompPodAnnotationKey: v1.SeccompProfileRuntimeDefault,
- },
- containerName: "container1",
- expectedProfile: v1.SeccompProfileRuntimeDefault,
- },
- {
- description: "pod docker/default seccomp profile with containerName should return docker/default",
- annotation: map[string]string{
- v1.SeccompPodAnnotationKey: v1.DeprecatedSeccompProfileDockerDefault,
- },
- containerName: "container1",
- expectedProfile: v1.DeprecatedSeccompProfileDockerDefault,
- },
- {
- description: "pod unconfined seccomp profile should return unconfined",
- annotation: map[string]string{
- v1.SeccompPodAnnotationKey: "unconfined",
- },
- expectedProfile: "unconfined",
- },
- {
- description: "pod unconfined seccomp profile with containerName should return unconfined",
- annotation: map[string]string{
- v1.SeccompPodAnnotationKey: "unconfined",
- },
- containerName: "container1",
- expectedProfile: "unconfined",
- },
- {
- description: "pod localhost seccomp profile should return local profile path",
- annotation: map[string]string{
- v1.SeccompPodAnnotationKey: "localhost/chmod.json",
- },
- expectedProfile: "localhost/" + filepath.Join(fakeSeccompProfileRoot, "chmod.json"),
- },
- {
- description: "pod localhost seccomp profile with containerName should return local profile path",
- annotation: map[string]string{
- v1.SeccompPodAnnotationKey: "localhost/chmod.json",
- },
- containerName: "container1",
- expectedProfile: "localhost/" + filepath.Join(fakeSeccompProfileRoot, "chmod.json"),
- },
- {
- description: "container localhost seccomp profile with containerName should return local profile path",
- annotation: map[string]string{
- v1.SeccompContainerAnnotationKeyPrefix + "container1": "localhost/chmod.json",
- },
- containerName: "container1",
- expectedProfile: "localhost/" + filepath.Join(fakeSeccompProfileRoot, "chmod.json"),
- },
- {
- description: "container localhost seccomp profile should override pod profile",
- annotation: map[string]string{
- v1.SeccompPodAnnotationKey: "unconfined",
- v1.SeccompContainerAnnotationKeyPrefix + "container1": "localhost/chmod.json",
- },
- containerName: "container1",
- expectedProfile: "localhost/" + filepath.Join(fakeSeccompProfileRoot, "chmod.json"),
- },
- {
- description: "container localhost seccomp profile with unmatched containerName should return empty string",
- annotation: map[string]string{
- v1.SeccompContainerAnnotationKeyPrefix + "container1": "localhost/chmod.json",
- },
- containerName: "container2",
- expectedProfile: "",
- },
- }
- for i, test := range tests {
- seccompProfile := m.getSeccompProfileFromAnnotations(test.annotation, test.containerName)
- assert.Equal(t, test.expectedProfile, seccompProfile, "TestCase[%d]", i)
- }
- }
- func TestNamespacesForPod(t *testing.T) {
- defer featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.PodShareProcessNamespace, true)()
- for desc, test := range map[string]struct {
- input *v1.Pod
- expected *runtimeapi.NamespaceOption
- }{
- "nil pod -> default v1 namespaces": {
- nil,
- &runtimeapi.NamespaceOption{
- Ipc: runtimeapi.NamespaceMode_POD,
- Network: runtimeapi.NamespaceMode_POD,
- Pid: runtimeapi.NamespaceMode_CONTAINER,
- },
- },
- "v1.Pod default namespaces": {
- &v1.Pod{},
- &runtimeapi.NamespaceOption{
- Ipc: runtimeapi.NamespaceMode_POD,
- Network: runtimeapi.NamespaceMode_POD,
- Pid: runtimeapi.NamespaceMode_CONTAINER,
- },
- },
- "Host Namespaces": {
- &v1.Pod{
- Spec: v1.PodSpec{
- HostIPC: true,
- HostNetwork: true,
- HostPID: true,
- },
- },
- &runtimeapi.NamespaceOption{
- Ipc: runtimeapi.NamespaceMode_NODE,
- Network: runtimeapi.NamespaceMode_NODE,
- Pid: runtimeapi.NamespaceMode_NODE,
- },
- },
- "Shared Process Namespace (feature enabled)": {
- &v1.Pod{
- Spec: v1.PodSpec{
- ShareProcessNamespace: &[]bool{true}[0],
- },
- },
- &runtimeapi.NamespaceOption{
- Ipc: runtimeapi.NamespaceMode_POD,
- Network: runtimeapi.NamespaceMode_POD,
- Pid: runtimeapi.NamespaceMode_POD,
- },
- },
- "Shared Process Namespace, redundant flag (feature enabled)": {
- &v1.Pod{
- Spec: v1.PodSpec{
- ShareProcessNamespace: &[]bool{false}[0],
- },
- },
- &runtimeapi.NamespaceOption{
- Ipc: runtimeapi.NamespaceMode_POD,
- Network: runtimeapi.NamespaceMode_POD,
- Pid: runtimeapi.NamespaceMode_CONTAINER,
- },
- },
- } {
- t.Logf("TestCase: %s", desc)
- actual := namespacesForPod(test.input)
- assert.Equal(t, test.expected, actual)
- }
- defer featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.PodShareProcessNamespace, false)()
- for desc, test := range map[string]struct {
- input *v1.Pod
- expected *runtimeapi.NamespaceOption
- }{
- "v1.Pod default namespaces": {
- &v1.Pod{},
- &runtimeapi.NamespaceOption{
- Ipc: runtimeapi.NamespaceMode_POD,
- Network: runtimeapi.NamespaceMode_POD,
- Pid: runtimeapi.NamespaceMode_CONTAINER,
- },
- },
- "Shared Process Namespace (feature disabled)": {
- &v1.Pod{
- Spec: v1.PodSpec{
- ShareProcessNamespace: &[]bool{true}[0],
- },
- },
- &runtimeapi.NamespaceOption{
- Ipc: runtimeapi.NamespaceMode_POD,
- Network: runtimeapi.NamespaceMode_POD,
- Pid: runtimeapi.NamespaceMode_CONTAINER,
- },
- },
- "Shared Process Namespace, redundant flag (feature disabled)": {
- &v1.Pod{
- Spec: v1.PodSpec{
- ShareProcessNamespace: &[]bool{false}[0],
- },
- },
- &runtimeapi.NamespaceOption{
- Ipc: runtimeapi.NamespaceMode_POD,
- Network: runtimeapi.NamespaceMode_POD,
- Pid: runtimeapi.NamespaceMode_CONTAINER,
- },
- },
- } {
- t.Logf("TestCase: %s", desc)
- actual := namespacesForPod(test.input)
- assert.Equal(t, test.expected, actual)
- }
- }
|