Skip to content
This repository has been archived by the owner on Apr 21, 2021. It is now read-only.

Commit

Permalink
validation: add a new test for NSNewNSWithoutPath
Browse files Browse the repository at this point in the history
This test is to check for NSNewNSWithoutPath, i.e. "If path is not
specified, the runtime MUST create a new container namespace of the
given type"

See also opencontainers#572

Signed-off-by: Dongsu Park <[email protected]>
  • Loading branch information
Dongsu Park committed Apr 12, 2018
1 parent 1736729 commit efd51d0
Show file tree
Hide file tree
Showing 2 changed files with 102 additions and 0 deletions.
88 changes: 88 additions & 0 deletions validation/linux_ns_nopath.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,88 @@
package main

import (
"fmt"
"os"
"path/filepath"
"runtime"

"github.com/mndrix/tap-go"
rspec "github.com/opencontainers/runtime-spec/specs-go"
"github.com/opencontainers/runtime-tools/specerror"
"github.com/opencontainers/runtime-tools/validation/util"
)

func testNamespaceNoPath(t *tap.T) error {
hostNsPath := fmt.Sprintf("/proc/%d/ns", os.Getpid())
hostNsInodes := map[string]string{}
for _, nsName := range util.ProcNamespaces {
nsInode, err := os.Readlink(filepath.Join(hostNsPath, nsName))
if err != nil {
return err
}
hostNsInodes[nsName] = nsInode
}

g, err := util.GetDefaultGenerator()
if err != nil {
return err
}

// As the namespaces, cgroups and user, are not set by GetDefaultGenerator(),
// others are set by default. We just set them explicitly to avoid confusion.
g.AddOrReplaceLinuxNamespace("cgroup", "")
g.AddOrReplaceLinuxNamespace("ipc", "")
g.AddOrReplaceLinuxNamespace("mount", "")
g.AddOrReplaceLinuxNamespace("network", "")
g.AddOrReplaceLinuxNamespace("pid", "")
g.AddOrReplaceLinuxNamespace("user", "")
g.AddOrReplaceLinuxNamespace("uts", "")

err = util.RuntimeOutsideValidate(g, func(config *rspec.Spec, state *rspec.State) error {
containerNsPath := fmt.Sprintf("/proc/%d/ns", state.Pid)

for _, nsName := range util.ProcNamespaces {
nsInode, err := os.Readlink(filepath.Join(containerNsPath, nsName))
if err != nil {
return err
}

t.Ok(hostNsInodes[nsName] != nsInode, fmt.Sprintf("create namespace %s without path", nsName))
if hostNsInodes[nsName] == nsInode {
specErr := specerror.NewError(specerror.NSNewNSWithoutPath,
fmt.Errorf("both namespaces for %s have the same inode %s", nsName, nsInode),
rspec.Version)
diagnostic := map[string]interface{}{
"expected": fmt.Sprintf("!= %s", hostNsInodes[nsName]),
"actual": nsInode,
"namespace type": nsName,
"level": specErr.(*specerror.Error).Err.Level,
"reference": specErr.(*specerror.Error).Err.Reference,
}
t.YAML(diagnostic)

continue
}
}

return nil
})

return err
}

func main() {
t := tap.New()
t.Header(0)

if "linux" != runtime.GOOS {
t.Skip(1, fmt.Sprintf("linux-specific namespace test"))
}

err := testNamespaceNoPath(t)
if err != nil {
util.Fatal(err)
}

t.AutoPlan()
}
14 changes: 14 additions & 0 deletions validation/util/linux_namespace.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
package util

// ProcNamespaces defines a list of namespaces to be found under /proc/*/ns/.
// NOTE: it is not the same as generate.Namespaces, because of naming
// mismatches like "mnt" vs "mount" or "net" vs "network".
var ProcNamespaces = []string{
"cgroup",
"ipc",
"mnt",
"net",
"pid",
"user",
"uts",
}

0 comments on commit efd51d0

Please sign in to comment.