You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
370 lines
8.7 KiB
Go
370 lines
8.7 KiB
Go
2 years ago
|
package integration
|
||
|
|
||
|
import (
|
||
|
"bufio"
|
||
|
"bytes"
|
||
|
"context"
|
||
|
"fmt"
|
||
|
"os"
|
||
|
"os/exec"
|
||
|
"path/filepath"
|
||
|
"runtime"
|
||
|
"strings"
|
||
|
"testing"
|
||
|
"time"
|
||
|
|
||
|
"github.com/google/shlex"
|
||
|
"github.com/moby/buildkit/util/bklog"
|
||
|
"github.com/pkg/errors"
|
||
|
)
|
||
|
|
||
|
const buildkitdConfigFile = "buildkitd.toml"
|
||
|
|
||
|
type backend struct {
|
||
|
address string
|
||
|
dockerAddress string
|
||
|
containerdAddress string
|
||
|
rootless bool
|
||
|
snapshotter string
|
||
|
unsupportedFeatures []string
|
||
|
isDockerd bool
|
||
|
}
|
||
|
|
||
|
func (b backend) Address() string {
|
||
|
return b.address
|
||
|
}
|
||
|
|
||
|
func (b backend) DockerAddress() string {
|
||
|
return b.dockerAddress
|
||
|
}
|
||
|
|
||
|
func (b backend) ContainerdAddress() string {
|
||
|
return b.containerdAddress
|
||
|
}
|
||
|
|
||
|
func (b backend) Rootless() bool {
|
||
|
return b.rootless
|
||
|
}
|
||
|
|
||
|
func (b backend) Snapshotter() string {
|
||
|
return b.snapshotter
|
||
|
}
|
||
|
|
||
|
func (b backend) isUnsupportedFeature(feature string) bool {
|
||
|
if enabledFeatures := os.Getenv("BUILDKIT_TEST_ENABLE_FEATURES"); enabledFeatures != "" {
|
||
|
for _, enabledFeature := range strings.Split(enabledFeatures, ",") {
|
||
|
if feature == enabledFeature {
|
||
|
return false
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
if disabledFeatures := os.Getenv("BUILDKIT_TEST_DISABLE_FEATURES"); disabledFeatures != "" {
|
||
|
for _, disabledFeature := range strings.Split(disabledFeatures, ",") {
|
||
|
if feature == disabledFeature {
|
||
|
return true
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
for _, unsupportedFeature := range b.unsupportedFeatures {
|
||
|
if feature == unsupportedFeature {
|
||
|
return true
|
||
|
}
|
||
|
}
|
||
|
return false
|
||
|
}
|
||
|
|
||
|
type sandbox struct {
|
||
|
Backend
|
||
|
|
||
|
logs map[string]*bytes.Buffer
|
||
|
cleanup *multiCloser
|
||
|
mv matrixValue
|
||
|
ctx context.Context
|
||
|
name string
|
||
|
}
|
||
|
|
||
|
func (sb *sandbox) Name() string {
|
||
|
return sb.name
|
||
|
}
|
||
|
|
||
|
func (sb *sandbox) Context() context.Context {
|
||
|
return sb.ctx
|
||
|
}
|
||
|
|
||
|
func (sb *sandbox) Logs() map[string]*bytes.Buffer {
|
||
|
return sb.logs
|
||
|
}
|
||
|
|
||
|
func (sb *sandbox) PrintLogs(t *testing.T) {
|
||
|
printLogs(sb.logs, t.Log)
|
||
|
}
|
||
|
|
||
|
func (sb *sandbox) ClearLogs() {
|
||
|
sb.logs = make(map[string]*bytes.Buffer)
|
||
|
}
|
||
|
|
||
|
func (sb *sandbox) NewRegistry() (string, error) {
|
||
|
url, cl, err := NewRegistry("")
|
||
|
if err != nil {
|
||
|
return "", err
|
||
|
}
|
||
|
sb.cleanup.append(cl)
|
||
|
return url, nil
|
||
|
}
|
||
|
|
||
|
func (sb *sandbox) Cmd(args ...string) *exec.Cmd {
|
||
|
if len(args) == 1 {
|
||
|
if split, err := shlex.Split(args[0]); err == nil {
|
||
|
args = split
|
||
|
}
|
||
|
}
|
||
|
cmd := exec.Command("buildctl", args...)
|
||
|
cmd.Env = append(cmd.Env, os.Environ()...)
|
||
|
cmd.Env = append(cmd.Env, "BUILDKIT_HOST="+sb.Address())
|
||
|
return cmd
|
||
|
}
|
||
|
|
||
|
func (sb *sandbox) Value(k string) interface{} {
|
||
|
return sb.mv.values[k].value
|
||
|
}
|
||
|
|
||
|
func newSandbox(ctx context.Context, w Worker, mirror string, mv matrixValue) (s Sandbox, cl func() error, err error) {
|
||
|
cfg := &BackendConfig{
|
||
|
Logs: make(map[string]*bytes.Buffer),
|
||
|
}
|
||
|
|
||
|
var upt []ConfigUpdater
|
||
|
for _, v := range mv.values {
|
||
|
if u, ok := v.value.(ConfigUpdater); ok {
|
||
|
upt = append(upt, u)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
if mirror != "" {
|
||
|
upt = append(upt, withMirrorConfig(mirror))
|
||
|
}
|
||
|
|
||
|
deferF := &multiCloser{}
|
||
|
cl = deferF.F()
|
||
|
|
||
|
defer func() {
|
||
|
if err != nil {
|
||
|
deferF.F()()
|
||
|
cl = nil
|
||
|
}
|
||
|
}()
|
||
|
|
||
|
if len(upt) > 0 {
|
||
|
dir, err := writeConfig(upt)
|
||
|
if err != nil {
|
||
|
return nil, nil, err
|
||
|
}
|
||
|
deferF.append(func() error {
|
||
|
return os.RemoveAll(dir)
|
||
|
})
|
||
|
cfg.ConfigFile = filepath.Join(dir, buildkitdConfigFile)
|
||
|
}
|
||
|
|
||
|
b, closer, err := w.New(ctx, cfg)
|
||
|
if err != nil {
|
||
|
return nil, nil, err
|
||
|
}
|
||
|
deferF.append(closer)
|
||
|
|
||
|
return &sandbox{
|
||
|
Backend: b,
|
||
|
logs: cfg.Logs,
|
||
|
cleanup: deferF,
|
||
|
mv: mv,
|
||
|
ctx: ctx,
|
||
|
name: w.Name(),
|
||
|
}, cl, nil
|
||
|
}
|
||
|
|
||
|
func getBuildkitdAddr(tmpdir string) string {
|
||
|
address := "unix://" + filepath.Join(tmpdir, "buildkitd.sock")
|
||
|
if runtime.GOOS == "windows" {
|
||
|
address = "//./pipe/buildkitd-" + filepath.Base(tmpdir)
|
||
|
}
|
||
|
return address
|
||
|
}
|
||
|
|
||
|
func runBuildkitd(ctx context.Context, conf *BackendConfig, args []string, logs map[string]*bytes.Buffer, uid, gid int, extraEnv []string) (address string, cl func() error, err error) {
|
||
|
deferF := &multiCloser{}
|
||
|
cl = deferF.F()
|
||
|
|
||
|
defer func() {
|
||
|
if err != nil {
|
||
|
deferF.F()()
|
||
|
cl = nil
|
||
|
}
|
||
|
}()
|
||
|
|
||
|
if conf.ConfigFile != "" {
|
||
|
args = append(args, "--config="+conf.ConfigFile)
|
||
|
}
|
||
|
|
||
|
tmpdir, err := os.MkdirTemp("", "bktest_buildkitd")
|
||
|
if err != nil {
|
||
|
return "", nil, err
|
||
|
}
|
||
|
if err := os.Chown(tmpdir, uid, gid); err != nil {
|
||
|
return "", nil, err
|
||
|
}
|
||
|
if err := os.MkdirAll(filepath.Join(tmpdir, "tmp"), 0711); err != nil {
|
||
|
return "", nil, err
|
||
|
}
|
||
|
if err := os.Chown(filepath.Join(tmpdir, "tmp"), uid, gid); err != nil {
|
||
|
return "", nil, err
|
||
|
}
|
||
|
|
||
|
deferF.append(func() error { return os.RemoveAll(tmpdir) })
|
||
|
|
||
|
address = getBuildkitdAddr(tmpdir)
|
||
|
|
||
|
args = append(args, "--root", tmpdir, "--addr", address, "--debug")
|
||
|
cmd := exec.Command(args[0], args[1:]...) //nolint:gosec // test utility
|
||
|
cmd.Env = append(os.Environ(), "BUILDKIT_DEBUG_EXEC_OUTPUT=1", "BUILDKIT_DEBUG_PANIC_ON_ERROR=1", "TMPDIR="+filepath.Join(tmpdir, "tmp"))
|
||
|
cmd.Env = append(cmd.Env, extraEnv...)
|
||
|
cmd.SysProcAttr = getSysProcAttr()
|
||
|
|
||
|
stop, err := startCmd(cmd, logs)
|
||
|
if err != nil {
|
||
|
return "", nil, err
|
||
|
}
|
||
|
deferF.append(stop)
|
||
|
|
||
|
if err := waitUnix(address, 15*time.Second, cmd); err != nil {
|
||
|
return "", nil, err
|
||
|
}
|
||
|
|
||
|
deferF.append(func() error {
|
||
|
f, err := os.Open("/proc/self/mountinfo")
|
||
|
if err != nil {
|
||
|
return errors.Wrap(err, "failed to open mountinfo")
|
||
|
}
|
||
|
defer f.Close()
|
||
|
s := bufio.NewScanner(f)
|
||
|
for s.Scan() {
|
||
|
if strings.Contains(s.Text(), tmpdir) {
|
||
|
return errors.Errorf("leaked mountpoint for %s", tmpdir)
|
||
|
}
|
||
|
}
|
||
|
return s.Err()
|
||
|
})
|
||
|
|
||
|
return address, cl, err
|
||
|
}
|
||
|
|
||
|
func getBackend(sb Sandbox) (*backend, error) {
|
||
|
sbx, ok := sb.(*sandbox)
|
||
|
if !ok {
|
||
|
return nil, errors.Errorf("invalid sandbox type %T", sb)
|
||
|
}
|
||
|
b, ok := sbx.Backend.(backend)
|
||
|
if !ok {
|
||
|
return nil, errors.Errorf("invalid backend type %T", b)
|
||
|
}
|
||
|
return &b, nil
|
||
|
}
|
||
|
|
||
|
func rootlessSupported(uid int) bool {
|
||
|
cmd := exec.Command("sudo", "-u", fmt.Sprintf("#%d", uid), "-i", "--", "exec", "unshare", "-U", "true") //nolint:gosec // test utility
|
||
|
b, err := cmd.CombinedOutput()
|
||
|
if err != nil {
|
||
|
bklog.L.Warnf("rootless mode is not supported on this host: %v (%s)", err, string(b))
|
||
|
return false
|
||
|
}
|
||
|
return true
|
||
|
}
|
||
|
|
||
|
func printLogs(logs map[string]*bytes.Buffer, f func(args ...interface{})) {
|
||
|
for name, l := range logs {
|
||
|
f(name)
|
||
|
s := bufio.NewScanner(l)
|
||
|
for s.Scan() {
|
||
|
f(s.Text())
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
|
||
|
const (
|
||
|
FeatureCacheExport = "cache_export"
|
||
|
FeatureCacheImport = "cache_import"
|
||
|
FeatureCacheBackendAzblob = "cache_backend_azblob"
|
||
|
FeatureCacheBackendGha = "cache_backend_gha"
|
||
|
FeatureCacheBackendInline = "cache_backend_inline"
|
||
|
FeatureCacheBackendLocal = "cache_backend_local"
|
||
|
FeatureCacheBackendRegistry = "cache_backend_registry"
|
||
|
FeatureCacheBackendS3 = "cache_backend_s3"
|
||
|
FeatureDirectPush = "direct_push"
|
||
|
FeatureFrontendOutline = "frontend_outline"
|
||
|
FeatureFrontendTargets = "frontend_targets"
|
||
|
FeatureImageExporter = "image_exporter"
|
||
|
FeatureInfo = "info"
|
||
|
FeatureMergeDiff = "merge_diff"
|
||
|
FeatureMultiCacheExport = "multi_cache_export"
|
||
|
FeatureMultiPlatform = "multi_platform"
|
||
|
FeatureOCIExporter = "oci_exporter"
|
||
|
FeatureOCILayout = "oci_layout"
|
||
|
FeatureProvenance = "provenance"
|
||
|
FeatureSBOM = "sbom"
|
||
|
FeatureSecurityMode = "security_mode"
|
||
|
FeatureSourceDateEpoch = "source_date_epoch"
|
||
|
FeatureCNINetwork = "cni_network"
|
||
|
)
|
||
|
|
||
|
var features = map[string]struct{}{
|
||
|
FeatureCacheExport: {},
|
||
|
FeatureCacheImport: {},
|
||
|
FeatureCacheBackendAzblob: {},
|
||
|
FeatureCacheBackendGha: {},
|
||
|
FeatureCacheBackendInline: {},
|
||
|
FeatureCacheBackendLocal: {},
|
||
|
FeatureCacheBackendRegistry: {},
|
||
|
FeatureCacheBackendS3: {},
|
||
|
FeatureDirectPush: {},
|
||
|
FeatureFrontendOutline: {},
|
||
|
FeatureFrontendTargets: {},
|
||
|
FeatureImageExporter: {},
|
||
|
FeatureInfo: {},
|
||
|
FeatureMergeDiff: {},
|
||
|
FeatureMultiCacheExport: {},
|
||
|
FeatureMultiPlatform: {},
|
||
|
FeatureOCIExporter: {},
|
||
|
FeatureOCILayout: {},
|
||
|
FeatureProvenance: {},
|
||
|
FeatureSBOM: {},
|
||
|
FeatureSecurityMode: {},
|
||
|
FeatureSourceDateEpoch: {},
|
||
|
FeatureCNINetwork: {},
|
||
|
}
|
||
|
|
||
|
func CheckFeatureCompat(t *testing.T, sb Sandbox, reason ...string) {
|
||
|
t.Helper()
|
||
|
if len(reason) == 0 {
|
||
|
t.Fatal("no reason provided")
|
||
|
}
|
||
|
b, err := getBackend(sb)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
if len(b.unsupportedFeatures) == 0 {
|
||
|
return
|
||
|
}
|
||
|
var ereasons []string
|
||
|
for _, r := range reason {
|
||
|
if _, ok := features[r]; ok {
|
||
|
if b.isUnsupportedFeature(r) {
|
||
|
ereasons = append(ereasons, r)
|
||
|
}
|
||
|
} else {
|
||
|
sb.ClearLogs()
|
||
|
t.Fatalf("unknown reason %q to skip test", r)
|
||
|
}
|
||
|
}
|
||
|
if len(ereasons) > 0 {
|
||
|
t.Skipf("%s worker can not currently run this test due to missing features (%s)", sb.Name(), strings.Join(ereasons, ", "))
|
||
|
}
|
||
|
}
|