runtime_test.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461
  1. /*
  2. Copyright 2018 The Kubernetes Authors.
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package util
  14. import (
  15. "io/ioutil"
  16. "net"
  17. "os"
  18. "reflect"
  19. "runtime"
  20. "testing"
  21. "github.com/pkg/errors"
  22. "k8s.io/kubernetes/cmd/kubeadm/app/constants"
  23. "k8s.io/utils/exec"
  24. fakeexec "k8s.io/utils/exec/testing"
  25. )
  26. func TestNewContainerRuntime(t *testing.T) {
  27. execLookPathOK := fakeexec.FakeExec{
  28. LookPathFunc: func(cmd string) (string, error) { return "/usr/bin/crictl", nil },
  29. }
  30. execLookPathErr := fakeexec.FakeExec{
  31. LookPathFunc: func(cmd string) (string, error) { return "", errors.Errorf("%s not found", cmd) },
  32. }
  33. cases := []struct {
  34. name string
  35. execer fakeexec.FakeExec
  36. criSocket string
  37. isDocker bool
  38. isError bool
  39. }{
  40. {"valid: default cri socket", execLookPathOK, constants.DefaultDockerCRISocket, true, false},
  41. {"valid: cri-o socket url", execLookPathOK, "unix:///var/run/crio/crio.sock", false, false},
  42. {"valid: cri-o socket path", execLookPathOK, "/var/run/crio/crio.sock", false, false},
  43. {"invalid: no crictl", execLookPathErr, "unix:///var/run/crio/crio.sock", false, true},
  44. }
  45. for _, tc := range cases {
  46. t.Run(tc.name, func(t *testing.T) {
  47. runtime, err := NewContainerRuntime(&tc.execer, tc.criSocket)
  48. if err != nil {
  49. if !tc.isError {
  50. t.Fatalf("unexpected NewContainerRuntime error. criSocket: %s, error: %v", tc.criSocket, err)
  51. }
  52. return // expected error occurs, impossible to test runtime further
  53. }
  54. if tc.isError && err == nil {
  55. t.Fatalf("unexpected NewContainerRuntime success. criSocket: %s", tc.criSocket)
  56. }
  57. isDocker := runtime.IsDocker()
  58. if tc.isDocker != isDocker {
  59. t.Fatalf("unexpected isDocker() result %v for the criSocket %s", isDocker, tc.criSocket)
  60. }
  61. })
  62. }
  63. }
  64. func genFakeActions(fcmd *fakeexec.FakeCmd, num int) []fakeexec.FakeCommandAction {
  65. var actions []fakeexec.FakeCommandAction
  66. for i := 0; i < num; i++ {
  67. actions = append(actions, func(cmd string, args ...string) exec.Cmd {
  68. return fakeexec.InitFakeCmd(fcmd, cmd, args...)
  69. })
  70. }
  71. return actions
  72. }
  73. func TestIsRunning(t *testing.T) {
  74. fcmd := fakeexec.FakeCmd{
  75. CombinedOutputScript: []fakeexec.FakeAction{
  76. func() ([]byte, []byte, error) { return nil, nil, nil },
  77. func() ([]byte, []byte, error) { return []byte("error"), nil, &fakeexec.FakeExitError{Status: 1} },
  78. func() ([]byte, []byte, error) { return nil, nil, nil },
  79. func() ([]byte, []byte, error) { return []byte("error"), nil, &fakeexec.FakeExitError{Status: 1} },
  80. },
  81. }
  82. criExecer := fakeexec.FakeExec{
  83. CommandScript: genFakeActions(&fcmd, len(fcmd.CombinedOutputScript)),
  84. LookPathFunc: func(cmd string) (string, error) { return "/usr/bin/crictl", nil },
  85. }
  86. dockerExecer := fakeexec.FakeExec{
  87. CommandScript: genFakeActions(&fcmd, len(fcmd.CombinedOutputScript)),
  88. LookPathFunc: func(cmd string) (string, error) { return "/usr/bin/docker", nil },
  89. }
  90. cases := []struct {
  91. name string
  92. criSocket string
  93. execer fakeexec.FakeExec
  94. isError bool
  95. }{
  96. {"valid: CRI-O is running", "unix:///var/run/crio/crio.sock", criExecer, false},
  97. {"invalid: CRI-O is not running", "unix:///var/run/crio/crio.sock", criExecer, true},
  98. {"valid: docker is running", constants.DefaultDockerCRISocket, dockerExecer, false},
  99. {"invalid: docker is not running", constants.DefaultDockerCRISocket, dockerExecer, true},
  100. }
  101. for _, tc := range cases {
  102. t.Run(tc.name, func(t *testing.T) {
  103. runtime, err := NewContainerRuntime(&tc.execer, tc.criSocket)
  104. if err != nil {
  105. t.Fatalf("unexpected NewContainerRuntime error: %v", err)
  106. }
  107. isRunning := runtime.IsRunning()
  108. if tc.isError && isRunning == nil {
  109. t.Error("unexpected IsRunning() success")
  110. }
  111. if !tc.isError && isRunning != nil {
  112. t.Error("unexpected IsRunning() error")
  113. }
  114. })
  115. }
  116. }
  117. func TestListKubeContainers(t *testing.T) {
  118. fcmd := fakeexec.FakeCmd{
  119. CombinedOutputScript: []fakeexec.FakeAction{
  120. func() ([]byte, []byte, error) { return []byte("k8s_p1\nk8s_p2"), nil, nil },
  121. func() ([]byte, []byte, error) { return nil, nil, &fakeexec.FakeExitError{Status: 1} },
  122. func() ([]byte, []byte, error) { return []byte("k8s_p1\nk8s_p2"), nil, nil },
  123. },
  124. }
  125. execer := fakeexec.FakeExec{
  126. CommandScript: genFakeActions(&fcmd, len(fcmd.CombinedOutputScript)),
  127. LookPathFunc: func(cmd string) (string, error) { return "/usr/bin/crictl", nil },
  128. }
  129. cases := []struct {
  130. name string
  131. criSocket string
  132. isError bool
  133. }{
  134. {"valid: list containers using CRI socket url", "unix:///var/run/crio/crio.sock", false},
  135. {"invalid: list containers using CRI socket url", "unix:///var/run/crio/crio.sock", true},
  136. {"valid: list containers using docker", constants.DefaultDockerCRISocket, false},
  137. }
  138. for _, tc := range cases {
  139. t.Run(tc.name, func(t *testing.T) {
  140. runtime, err := NewContainerRuntime(&execer, tc.criSocket)
  141. if err != nil {
  142. t.Fatalf("unexpected NewContainerRuntime error: %v", err)
  143. }
  144. containers, err := runtime.ListKubeContainers()
  145. if tc.isError {
  146. if err == nil {
  147. t.Errorf("unexpected ListKubeContainers success")
  148. }
  149. return
  150. } else if err != nil {
  151. t.Errorf("unexpected ListKubeContainers error: %v", err)
  152. }
  153. if !reflect.DeepEqual(containers, []string{"k8s_p1", "k8s_p2"}) {
  154. t.Errorf("unexpected ListKubeContainers output: %v", containers)
  155. }
  156. })
  157. }
  158. }
  159. func TestRemoveContainers(t *testing.T) {
  160. fakeOK := func() ([]byte, []byte, error) { return nil, nil, nil }
  161. fakeErr := func() ([]byte, []byte, error) { return []byte("error"), nil, &fakeexec.FakeExitError{Status: 1} }
  162. fcmd := fakeexec.FakeCmd{
  163. CombinedOutputScript: []fakeexec.FakeAction{
  164. fakeOK, fakeOK, fakeOK, fakeOK, fakeOK, fakeOK, // Test case 1
  165. fakeOK, fakeOK, fakeOK, fakeErr, fakeOK, fakeOK,
  166. fakeErr, fakeOK, fakeOK, fakeErr, fakeOK,
  167. fakeOK, fakeOK, fakeOK,
  168. fakeOK, fakeErr, fakeOK,
  169. },
  170. }
  171. execer := fakeexec.FakeExec{
  172. CommandScript: genFakeActions(&fcmd, len(fcmd.CombinedOutputScript)),
  173. LookPathFunc: func(cmd string) (string, error) { return "/usr/bin/crictl", nil },
  174. }
  175. cases := []struct {
  176. name string
  177. criSocket string
  178. containers []string
  179. isError bool
  180. }{
  181. {"valid: remove containers using CRI", "unix:///var/run/crio/crio.sock", []string{"k8s_p1", "k8s_p2", "k8s_p3"}, false}, // Test case 1
  182. {"invalid: CRI rmp failure", "unix:///var/run/crio/crio.sock", []string{"k8s_p1", "k8s_p2", "k8s_p3"}, true},
  183. {"invalid: CRI stopp failure", "unix:///var/run/crio/crio.sock", []string{"k8s_p1", "k8s_p2", "k8s_p3"}, true},
  184. {"valid: remove containers using docker", constants.DefaultDockerCRISocket, []string{"k8s_c1", "k8s_c2", "k8s_c3"}, false},
  185. {"invalid: remove containers using docker", constants.DefaultDockerCRISocket, []string{"k8s_c1", "k8s_c2", "k8s_c3"}, true},
  186. }
  187. for _, tc := range cases {
  188. t.Run(tc.name, func(t *testing.T) {
  189. runtime, err := NewContainerRuntime(&execer, tc.criSocket)
  190. if err != nil {
  191. t.Fatalf("unexpected NewContainerRuntime error: %v, criSocket: %s", err, tc.criSocket)
  192. }
  193. err = runtime.RemoveContainers(tc.containers)
  194. if !tc.isError && err != nil {
  195. t.Errorf("unexpected RemoveContainers errors: %v, criSocket: %s, containers: %v", err, tc.criSocket, tc.containers)
  196. }
  197. if tc.isError && err == nil {
  198. t.Errorf("unexpected RemoveContainers success, criSocket: %s, containers: %v", tc.criSocket, tc.containers)
  199. }
  200. })
  201. }
  202. }
  203. func TestPullImage(t *testing.T) {
  204. fcmd := fakeexec.FakeCmd{
  205. CombinedOutputScript: []fakeexec.FakeAction{
  206. func() ([]byte, []byte, error) { return nil, nil, nil },
  207. // If the pull fails, it will be retried 5 times (see PullImageRetry in constants/constants.go)
  208. func() ([]byte, []byte, error) { return []byte("error"), nil, &fakeexec.FakeExitError{Status: 1} },
  209. func() ([]byte, []byte, error) { return []byte("error"), nil, &fakeexec.FakeExitError{Status: 1} },
  210. func() ([]byte, []byte, error) { return []byte("error"), nil, &fakeexec.FakeExitError{Status: 1} },
  211. func() ([]byte, []byte, error) { return []byte("error"), nil, &fakeexec.FakeExitError{Status: 1} },
  212. func() ([]byte, []byte, error) { return []byte("error"), nil, &fakeexec.FakeExitError{Status: 1} },
  213. func() ([]byte, []byte, error) { return nil, nil, nil },
  214. // If the pull fails, it will be retried 5 times (see PullImageRetry in constants/constants.go)
  215. func() ([]byte, []byte, error) { return []byte("error"), nil, &fakeexec.FakeExitError{Status: 1} },
  216. func() ([]byte, []byte, error) { return []byte("error"), nil, &fakeexec.FakeExitError{Status: 1} },
  217. func() ([]byte, []byte, error) { return []byte("error"), nil, &fakeexec.FakeExitError{Status: 1} },
  218. func() ([]byte, []byte, error) { return []byte("error"), nil, &fakeexec.FakeExitError{Status: 1} },
  219. func() ([]byte, []byte, error) { return []byte("error"), nil, &fakeexec.FakeExitError{Status: 1} },
  220. },
  221. }
  222. execer := fakeexec.FakeExec{
  223. CommandScript: genFakeActions(&fcmd, len(fcmd.CombinedOutputScript)),
  224. LookPathFunc: func(cmd string) (string, error) { return "/usr/bin/crictl", nil },
  225. }
  226. cases := []struct {
  227. name string
  228. criSocket string
  229. image string
  230. isError bool
  231. }{
  232. {"valid: pull image using CRI", "unix:///var/run/crio/crio.sock", "image1", false},
  233. {"invalid: CRI pull error", "unix:///var/run/crio/crio.sock", "image2", true},
  234. {"valid: pull image using docker", constants.DefaultDockerCRISocket, "image1", false},
  235. {"invalid: docker pull error", constants.DefaultDockerCRISocket, "image2", true},
  236. }
  237. for _, tc := range cases {
  238. t.Run(tc.name, func(t *testing.T) {
  239. runtime, err := NewContainerRuntime(&execer, tc.criSocket)
  240. if err != nil {
  241. t.Fatalf("unexpected NewContainerRuntime error: %v, criSocket: %s", err, tc.criSocket)
  242. }
  243. err = runtime.PullImage(tc.image)
  244. if !tc.isError && err != nil {
  245. t.Errorf("unexpected PullImage error: %v, criSocket: %s, image: %s", err, tc.criSocket, tc.image)
  246. }
  247. if tc.isError && err == nil {
  248. t.Errorf("unexpected PullImage success, criSocket: %s, image: %s", tc.criSocket, tc.image)
  249. }
  250. })
  251. }
  252. }
  253. func TestImageExists(t *testing.T) {
  254. fcmd := fakeexec.FakeCmd{
  255. RunScript: []fakeexec.FakeAction{
  256. func() ([]byte, []byte, error) { return nil, nil, nil },
  257. func() ([]byte, []byte, error) { return nil, nil, &fakeexec.FakeExitError{Status: 1} },
  258. func() ([]byte, []byte, error) { return nil, nil, nil },
  259. func() ([]byte, []byte, error) { return nil, nil, &fakeexec.FakeExitError{Status: 1} },
  260. },
  261. }
  262. execer := fakeexec.FakeExec{
  263. CommandScript: genFakeActions(&fcmd, len(fcmd.RunScript)),
  264. LookPathFunc: func(cmd string) (string, error) { return "/usr/bin/crictl", nil },
  265. }
  266. cases := []struct {
  267. name string
  268. criSocket string
  269. image string
  270. result bool
  271. }{
  272. {"valid: test if image exists using CRI", "unix:///var/run/crio/crio.sock", "image1", false},
  273. {"invalid: CRI inspecti failure", "unix:///var/run/crio/crio.sock", "image2", true},
  274. {"valid: test if image exists using docker", constants.DefaultDockerCRISocket, "image1", false},
  275. {"invalid: docker inspect failure", constants.DefaultDockerCRISocket, "image2", true},
  276. }
  277. for _, tc := range cases {
  278. t.Run(tc.name, func(t *testing.T) {
  279. runtime, err := NewContainerRuntime(&execer, tc.criSocket)
  280. if err != nil {
  281. t.Fatalf("unexpected NewContainerRuntime error: %v, criSocket: %s", err, tc.criSocket)
  282. }
  283. result, err := runtime.ImageExists(tc.image)
  284. if !tc.result != result {
  285. t.Errorf("unexpected ImageExists result: %t, criSocket: %s, image: %s, expected result: %t", err, tc.criSocket, tc.image, tc.result)
  286. }
  287. })
  288. }
  289. }
  290. func TestIsExistingSocket(t *testing.T) {
  291. // this test is not expected to work on Windows
  292. if runtime.GOOS == "windows" {
  293. return
  294. }
  295. const tempPrefix = "test.kubeadm.runtime.isExistingSocket."
  296. tests := []struct {
  297. name string
  298. proc func(*testing.T)
  299. }{
  300. {
  301. name: "Valid domain socket is detected as such",
  302. proc: func(t *testing.T) {
  303. tmpFile, err := ioutil.TempFile("", tempPrefix)
  304. if err != nil {
  305. t.Fatalf("unexpected error by TempFile: %v", err)
  306. }
  307. theSocket := tmpFile.Name()
  308. os.Remove(theSocket)
  309. tmpFile.Close()
  310. con, err := net.Listen("unix", theSocket)
  311. if err != nil {
  312. t.Fatalf("unexpected error while dialing a socket: %v", err)
  313. }
  314. defer con.Close()
  315. if !isExistingSocket(theSocket) {
  316. t.Fatalf("isExistingSocket(%q) gave unexpected result. Should have been true, instead of false", theSocket)
  317. }
  318. },
  319. },
  320. {
  321. name: "Regular file is not a domain socket",
  322. proc: func(t *testing.T) {
  323. tmpFile, err := ioutil.TempFile("", tempPrefix)
  324. if err != nil {
  325. t.Fatalf("unexpected error by TempFile: %v", err)
  326. }
  327. theSocket := tmpFile.Name()
  328. defer os.Remove(theSocket)
  329. tmpFile.Close()
  330. if isExistingSocket(theSocket) {
  331. t.Fatalf("isExistingSocket(%q) gave unexpected result. Should have been false, instead of true", theSocket)
  332. }
  333. },
  334. },
  335. {
  336. name: "Non existent socket is not a domain socket",
  337. proc: func(t *testing.T) {
  338. const theSocket = "/non/existent/socket"
  339. if isExistingSocket(theSocket) {
  340. t.Fatalf("isExistingSocket(%q) gave unexpected result. Should have been false, instead of true", theSocket)
  341. }
  342. },
  343. },
  344. }
  345. for _, test := range tests {
  346. t.Run(test.name, test.proc)
  347. }
  348. }
  349. func TestDetectCRISocketImpl(t *testing.T) {
  350. tests := []struct {
  351. name string
  352. existingSockets []string
  353. expectedError bool
  354. expectedSocket string
  355. }{
  356. {
  357. name: "No existing sockets, use Docker",
  358. existingSockets: []string{},
  359. expectedError: false,
  360. expectedSocket: constants.DefaultDockerCRISocket,
  361. },
  362. {
  363. name: "One valid CRI socket leads to success",
  364. existingSockets: []string{"/var/run/crio/crio.sock"},
  365. expectedError: false,
  366. expectedSocket: "/var/run/crio/crio.sock",
  367. },
  368. {
  369. name: "Correct Docker CRI socket is returned",
  370. existingSockets: []string{"/var/run/docker.sock"},
  371. expectedError: false,
  372. expectedSocket: constants.DefaultDockerCRISocket,
  373. },
  374. {
  375. name: "CRI and Docker sockets lead to an error",
  376. existingSockets: []string{
  377. "/var/run/docker.sock",
  378. "/var/run/crio/crio.sock",
  379. },
  380. expectedError: true,
  381. },
  382. {
  383. name: "Docker and containerd lead to Docker being used",
  384. existingSockets: []string{
  385. "/var/run/docker.sock",
  386. "/run/containerd/containerd.sock",
  387. },
  388. expectedError: false,
  389. expectedSocket: constants.DefaultDockerCRISocket,
  390. },
  391. {
  392. name: "A couple of CRI sockets lead to an error",
  393. existingSockets: []string{
  394. "/var/run/crio/crio.sock",
  395. "/run/containerd/containerd.sock",
  396. },
  397. expectedError: true,
  398. },
  399. }
  400. for _, test := range tests {
  401. t.Run(test.name, func(t *testing.T) {
  402. socket, err := detectCRISocketImpl(func(path string) bool {
  403. for _, existing := range test.existingSockets {
  404. if path == existing {
  405. return true
  406. }
  407. }
  408. return false
  409. })
  410. if (err != nil) != test.expectedError {
  411. t.Fatalf("detectCRISocketImpl returned unexpected result\n\tExpected error: %t\n\tGot error: %t", test.expectedError, err != nil)
  412. }
  413. if !test.expectedError && socket != test.expectedSocket {
  414. t.Fatalf("detectCRISocketImpl returned unexpected CRI socket\n\tExpected socket: %s\n\tReturned socket: %s",
  415. test.expectedSocket, socket)
  416. }
  417. })
  418. }
  419. }