mirror of
https://github.com/systemd/systemd-stable.git
synced 2024-12-24 21:34:08 +03:00
98f654fdea
machinectl fails since 21935150a0
as it's now
mounting onto a file descriptor in a target namespace, without joining the
target's PID namespace.
Note that it's not enough to setns CLONE_NEWPID, but a double-fork is required
as well, as implemented by namespace_fork().
Add a test case to TEST-13-NSPAWN to cover this use case.
215 lines
8.5 KiB
Bash
Executable File
215 lines
8.5 KiB
Bash
Executable File
#!/usr/bin/env bash
|
|
set -x
|
|
set -e
|
|
set -u
|
|
set -o pipefail
|
|
|
|
export SYSTEMD_LOG_LEVEL=debug
|
|
|
|
# check cgroup-v2
|
|
is_v2_supported=no
|
|
mkdir -p /tmp/cgroup2
|
|
if mount -t cgroup2 cgroup2 /tmp/cgroup2; then
|
|
is_v2_supported=yes
|
|
umount /tmp/cgroup2
|
|
fi
|
|
rmdir /tmp/cgroup2
|
|
|
|
# check cgroup namespaces
|
|
is_cgns_supported=no
|
|
if [[ -f /proc/1/ns/cgroup ]]; then
|
|
is_cgns_supported=yes
|
|
fi
|
|
|
|
is_user_ns_supported=no
|
|
# On some systems (e.g. CentOS 7) the default limit for user namespaces
|
|
# is set to 0, which causes the following unshare syscall to fail, even
|
|
# with enabled user namespaces support. By setting this value explicitly
|
|
# we can ensure the user namespaces support to be detected correctly.
|
|
sysctl -w user.max_user_namespaces=10000
|
|
if unshare -U sh -c :; then
|
|
is_user_ns_supported=yes
|
|
fi
|
|
|
|
SUSE_OPTS=""
|
|
ID_LIKE=$(awk -F= '$1=="ID_LIKE" { print $2 ;}' /etc/os-release)
|
|
if [[ "$ID_LIKE" = *"suse"* ]]; then
|
|
SUSE_OPTS="--bind /lib64 --bind /usr/lib64 "
|
|
fi
|
|
|
|
function check_bind_tmp_path {
|
|
# https://github.com/systemd/systemd/issues/4789
|
|
local _root="/var/lib/machines/testsuite-13.bind-tmp-path"
|
|
rm -rf "$_root"
|
|
/usr/lib/systemd/tests/testdata/create-busybox-container "$_root"
|
|
>/tmp/bind
|
|
systemd-nspawn $SUSE_OPTS--register=no -D "$_root" --bind=/tmp/bind /bin/sh -c 'test -e /tmp/bind'
|
|
}
|
|
|
|
function check_norbind {
|
|
# https://github.com/systemd/systemd/issues/13170
|
|
local _root="/var/lib/machines/testsuite-13.norbind-path"
|
|
rm -rf "$_root"
|
|
mkdir -p /tmp/binddir/subdir
|
|
echo -n "outer" > /tmp/binddir/subdir/file
|
|
mount -t tmpfs tmpfs /tmp/binddir/subdir
|
|
echo -n "inner" > /tmp/binddir/subdir/file
|
|
/usr/lib/systemd/tests/testdata/create-busybox-container "$_root"
|
|
systemd-nspawn $SUSE_OPTS--register=no -D "$_root" --bind=/tmp/binddir:/mnt:norbind /bin/sh -c 'CONTENT=$(cat /mnt/subdir/file); if [[ $CONTENT != "outer" ]]; then echo "*** unexpected content: $CONTENT"; return 1; fi'
|
|
}
|
|
|
|
function check_notification_socket {
|
|
# https://github.com/systemd/systemd/issues/4944
|
|
local _cmd='echo a | $(busybox which nc) -U -u -w 1 /run/host/notify'
|
|
# /testsuite-13.nc-container is prepared by test.sh
|
|
systemd-nspawn $SUSE_OPTS--register=no -D /testsuite-13.nc-container /bin/sh -x -c "$_cmd"
|
|
systemd-nspawn $SUSE_OPTS--register=no -D /testsuite-13.nc-container -U /bin/sh -x -c "$_cmd"
|
|
}
|
|
|
|
function check_os_release {
|
|
local _cmd='. /tmp/os-release
|
|
if [ -n "${ID:+set}" ] && [ "${ID}" != "${container_host_id}" ]; then exit 1; fi
|
|
if [ -n "${VERSION_ID:+set}" ] && [ "${VERSION_ID}" != "${container_host_version_id}" ]; then exit 1; fi
|
|
if [ -n "${BUILD_ID:+set}" ] && [ "${BUILD_ID}" != "${container_host_build_id}" ]; then exit 1; fi
|
|
if [ -n "${VARIANT_ID:+set}" ] && [ "${VARIANT_ID}" != "${container_host_variant_id}" ]; then exit 1; fi
|
|
cd /tmp; (cd /run/host; md5sum os-release) | md5sum -c
|
|
if echo test >> /run/host/os-release; then exit 1; fi
|
|
'
|
|
|
|
local _os_release_source="/etc/os-release"
|
|
if [ ! -r "${_os_release_source}" ]; then
|
|
_os_release_source="/usr/lib/os-release"
|
|
elif [ -L "${_os_release_source}" ] && rm /etc/os-release; then
|
|
# Ensure that /etc always wins if available
|
|
cp /usr/lib/os-release /etc
|
|
echo MARKER=1 >> /etc/os-release
|
|
fi
|
|
|
|
systemd-nspawn $SUSE_OPTS--register=no -D /testsuite-13.nc-container --bind="${_os_release_source}":/tmp/os-release /bin/sh -x -e -c "$_cmd"
|
|
|
|
if grep -q MARKER /etc/os-release; then
|
|
rm /etc/os-release
|
|
ln -s ../usr/lib/os-release /etc/os-release
|
|
fi
|
|
}
|
|
|
|
function check_machinectl_bind {
|
|
local _cmd='for i in $(seq 1 20); do if test -f /tmp/marker; then exit 0; fi; sleep 0.5; done; exit 1;'
|
|
|
|
cat <<EOF > /run/systemd/system/nspawn_machinectl_bind.service
|
|
[Service]
|
|
Type=notify
|
|
ExecStart=systemd-nspawn $SUSE_OPTS -D /testsuite-13.nc-container --notify-ready=no /bin/sh -x -e -c "$_cmd"
|
|
EOF
|
|
|
|
systemctl start nspawn_machinectl_bind.service
|
|
|
|
touch /tmp/marker
|
|
|
|
machinectl bind --mkdir testsuite-13.nc-container /tmp/marker
|
|
|
|
while systemctl show -P SubState nspawn_machinectl_bind.service | grep -q running
|
|
do
|
|
sleep 0.1
|
|
done
|
|
|
|
return $(systemctl show -P ExecMainStatus nspawn_machinectl_bind.service)
|
|
}
|
|
|
|
function run {
|
|
if [[ "$1" = "yes" && "$is_v2_supported" = "no" ]]; then
|
|
printf "Unified cgroup hierarchy is not supported. Skipping.\n" >&2
|
|
return 0
|
|
fi
|
|
if [[ "$2" = "yes" && "$is_cgns_supported" = "no" ]]; then
|
|
printf "CGroup namespaces are not supported. Skipping.\n" >&2
|
|
return 0
|
|
fi
|
|
|
|
local _root="/var/lib/machines/testsuite-13.unified-$1-cgns-$2-api-vfs-writable-$3"
|
|
rm -rf "$_root"
|
|
/usr/lib/systemd/tests/testdata/create-busybox-container "$_root"
|
|
SYSTEMD_NSPAWN_UNIFIED_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn $SUSE_OPTS--register=no -D "$_root" -b
|
|
SYSTEMD_NSPAWN_UNIFIED_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn $SUSE_OPTS--register=no -D "$_root" --private-network -b
|
|
|
|
if SYSTEMD_NSPAWN_UNIFIED_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn $SUSE_OPTS--register=no -D "$_root" -U -b; then
|
|
[[ "$is_user_ns_supported" = "yes" && "$3" = "network" ]] && return 1
|
|
else
|
|
[[ "$is_user_ns_supported" = "no" && "$3" = "network" ]] && return 1
|
|
fi
|
|
|
|
if SYSTEMD_NSPAWN_UNIFIED_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn $SUSE_OPTS--register=no -D "$_root" --private-network -U -b; then
|
|
[[ "$is_user_ns_supported" = "yes" && "$3" = "yes" ]] && return 1
|
|
else
|
|
[[ "$is_user_ns_supported" = "no" && "$3" = "yes" ]] && return 1
|
|
fi
|
|
|
|
local _netns_opt="--network-namespace-path=/proc/self/ns/net"
|
|
|
|
# --network-namespace-path and network-related options cannot be used together
|
|
if SYSTEMD_NSPAWN_UNIFIED_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn $SUSE_OPTS--register=no -D "$_root" "$_netns_opt" --network-interface=lo -b; then
|
|
return 1
|
|
fi
|
|
|
|
if SYSTEMD_NSPAWN_UNIFIED_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn $SUSE_OPTS--register=no -D "$_root" "$_netns_opt" --network-macvlan=lo -b; then
|
|
return 1
|
|
fi
|
|
|
|
if SYSTEMD_NSPAWN_UNIFIED_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn $SUSE_OPTS--register=no -D "$_root" "$_netns_opt" --network-ipvlan=lo -b; then
|
|
return 1
|
|
fi
|
|
|
|
if SYSTEMD_NSPAWN_UNIFIED_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn $SUSE_OPTS--register=no -D "$_root" "$_netns_opt" --network-veth -b; then
|
|
return 1
|
|
fi
|
|
|
|
if SYSTEMD_NSPAWN_UNIFIED_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn $SUSE_OPTS--register=no -D "$_root" "$_netns_opt" --network-veth-extra=lo -b; then
|
|
return 1
|
|
fi
|
|
|
|
if SYSTEMD_NSPAWN_UNIFIED_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn $SUSE_OPTS--register=no -D "$_root" "$_netns_opt" --network-bridge=lo -b; then
|
|
return 1
|
|
fi
|
|
|
|
if SYSTEMD_NSPAWN_UNIFIED_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn $SUSE_OPTS--register=no -D "$_root" "$_netns_opt" --network-zone=zone -b; then
|
|
return 1
|
|
fi
|
|
|
|
# allow combination of --network-namespace-path and --private-network
|
|
if ! SYSTEMD_NSPAWN_UNIFIED_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn $SUSE_OPTS--register=no -D "$_root" "$_netns_opt" --private-network -b; then
|
|
return 1
|
|
fi
|
|
|
|
# test --network-namespace-path works with a network namespace created by "ip netns"
|
|
ip netns add nspawn_test
|
|
_netns_opt="--network-namespace-path=/run/netns/nspawn_test"
|
|
SYSTEMD_NSPAWN_UNIFIED_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn $SUSE_OPTS--register=no -D "$_root" "$_netns_opt" /bin/ip a | grep -v -E '^1: lo.*UP'
|
|
local r=$?
|
|
ip netns del nspawn_test
|
|
|
|
if [ $r -ne 0 ]; then
|
|
return 1
|
|
fi
|
|
|
|
return 0
|
|
}
|
|
|
|
check_bind_tmp_path
|
|
|
|
check_norbind
|
|
|
|
check_notification_socket
|
|
|
|
check_os_release
|
|
|
|
for api_vfs_writable in yes no network; do
|
|
run no no $api_vfs_writable
|
|
run yes no $api_vfs_writable
|
|
run no yes $api_vfs_writable
|
|
run yes yes $api_vfs_writable
|
|
done
|
|
|
|
check_machinectl_bind
|
|
|
|
touch /testok
|