github.com/docker/engine@v22.0.0-20211208180946-d456264580cf+incompatible/pkg/archive/changes_test.go (about) 1 package archive // import "github.com/docker/docker/pkg/archive" 2 3 import ( 4 "os" 5 "os/exec" 6 "path" 7 "path/filepath" 8 "runtime" 9 "sort" 10 "strconv" 11 "strings" 12 "syscall" 13 "testing" 14 "time" 15 16 "github.com/Microsoft/hcsshim/osversion" 17 "github.com/docker/docker/pkg/parsers/kernel" 18 "github.com/docker/docker/pkg/system" 19 "gotest.tools/v3/assert" 20 "gotest.tools/v3/skip" 21 ) 22 23 func max(x, y int) int { 24 if x >= y { 25 return x 26 } 27 return y 28 } 29 30 func copyDir(src, dst string) error { 31 if runtime.GOOS != "windows" { 32 return exec.Command("cp", "-a", src, dst).Run() 33 } 34 35 // Could have used xcopy src dst /E /I /H /Y /B. However, xcopy has the 36 // unfortunate side effect of not preserving timestamps of newly created 37 // directories in the target directory, so we don't get accurate changes. 38 // Use robocopy instead. Note this isn't available in microsoft/nanoserver. 39 // But it has gotchas. See https://weblogs.sqlteam.com/robv/archive/2010/02/17/61106.aspx 40 err := exec.Command("robocopy", filepath.FromSlash(src), filepath.FromSlash(dst), "/SL", "/COPYALL", "/MIR").Run() 41 if exiterr, ok := err.(*exec.ExitError); ok { 42 if status, ok := exiterr.Sys().(syscall.WaitStatus); ok { 43 if status.ExitStatus()&24 == 0 { 44 return nil 45 } 46 } 47 } 48 return err 49 } 50 51 type FileType uint32 52 53 const ( 54 Regular FileType = iota 55 Dir 56 Symlink 57 ) 58 59 type FileData struct { 60 filetype FileType 61 path string 62 contents string 63 permissions os.FileMode 64 } 65 66 func createSampleDir(t *testing.T, root string) { 67 files := []FileData{ 68 {filetype: Regular, path: "file1", contents: "file1\n", permissions: 0600}, 69 {filetype: Regular, path: "file2", contents: "file2\n", permissions: 0666}, 70 {filetype: Regular, path: "file3", contents: "file3\n", permissions: 0404}, 71 {filetype: Regular, path: "file4", contents: "file4\n", permissions: 0600}, 72 {filetype: Regular, path: "file5", contents: "file5\n", permissions: 0600}, 73 {filetype: Regular, path: "file6", contents: "file6\n", permissions: 0600}, 74 {filetype: Regular, path: "file7", contents: "file7\n", permissions: 0600}, 75 {filetype: Dir, path: "dir1", contents: "", permissions: 0740}, 76 {filetype: Regular, path: "dir1/file1-1", contents: "file1-1\n", permissions: 01444}, 77 {filetype: Regular, path: "dir1/file1-2", contents: "file1-2\n", permissions: 0666}, 78 {filetype: Dir, path: "dir2", contents: "", permissions: 0700}, 79 {filetype: Regular, path: "dir2/file2-1", contents: "file2-1\n", permissions: 0666}, 80 {filetype: Regular, path: "dir2/file2-2", contents: "file2-2\n", permissions: 0666}, 81 {filetype: Dir, path: "dir3", contents: "", permissions: 0700}, 82 {filetype: Regular, path: "dir3/file3-1", contents: "file3-1\n", permissions: 0666}, 83 {filetype: Regular, path: "dir3/file3-2", contents: "file3-2\n", permissions: 0666}, 84 {filetype: Dir, path: "dir4", contents: "", permissions: 0700}, 85 {filetype: Regular, path: "dir4/file3-1", contents: "file4-1\n", permissions: 0666}, 86 {filetype: Regular, path: "dir4/file3-2", contents: "file4-2\n", permissions: 0666}, 87 {filetype: Symlink, path: "symlink1", contents: "target1", permissions: 0666}, 88 {filetype: Symlink, path: "symlink2", contents: "target2", permissions: 0666}, 89 {filetype: Symlink, path: "symlink3", contents: root + "/file1", permissions: 0666}, 90 {filetype: Symlink, path: "symlink4", contents: root + "/symlink3", permissions: 0666}, 91 {filetype: Symlink, path: "dirSymlink", contents: root + "/dir1", permissions: 0740}, 92 } 93 provisionSampleDir(t, root, files) 94 } 95 96 func provisionSampleDir(t *testing.T, root string, files []FileData) { 97 now := time.Now() 98 for _, info := range files { 99 p := path.Join(root, info.path) 100 if info.filetype == Dir { 101 err := os.MkdirAll(p, info.permissions) 102 assert.NilError(t, err) 103 } else if info.filetype == Regular { 104 err := os.WriteFile(p, []byte(info.contents), info.permissions) 105 assert.NilError(t, err) 106 } else if info.filetype == Symlink { 107 err := os.Symlink(info.contents, p) 108 assert.NilError(t, err) 109 } 110 111 if info.filetype != Symlink { 112 // Set a consistent ctime, atime for all files and dirs 113 err := system.Chtimes(p, now, now) 114 assert.NilError(t, err) 115 } 116 } 117 } 118 119 func TestChangeString(t *testing.T) { 120 modifyChange := Change{"change", ChangeModify} 121 toString := modifyChange.String() 122 if toString != "C change" { 123 t.Fatalf("String() of a change with ChangeModify Kind should have been %s but was %s", "C change", toString) 124 } 125 addChange := Change{"change", ChangeAdd} 126 toString = addChange.String() 127 if toString != "A change" { 128 t.Fatalf("String() of a change with ChangeAdd Kind should have been %s but was %s", "A change", toString) 129 } 130 deleteChange := Change{"change", ChangeDelete} 131 toString = deleteChange.String() 132 if toString != "D change" { 133 t.Fatalf("String() of a change with ChangeDelete Kind should have been %s but was %s", "D change", toString) 134 } 135 } 136 137 func TestChangesWithNoChanges(t *testing.T) { 138 rwLayer, err := os.MkdirTemp("", "docker-changes-test") 139 assert.NilError(t, err) 140 defer os.RemoveAll(rwLayer) 141 layer, err := os.MkdirTemp("", "docker-changes-test-layer") 142 assert.NilError(t, err) 143 defer os.RemoveAll(layer) 144 createSampleDir(t, layer) 145 changes, err := Changes([]string{layer}, rwLayer) 146 assert.NilError(t, err) 147 if len(changes) != 0 { 148 t.Fatalf("Changes with no difference should have detect no changes, but detected %d", len(changes)) 149 } 150 } 151 152 func TestChangesWithChanges(t *testing.T) { 153 // Mock the readonly layer 154 layer, err := os.MkdirTemp("", "docker-changes-test-layer") 155 assert.NilError(t, err) 156 defer os.RemoveAll(layer) 157 createSampleDir(t, layer) 158 os.MkdirAll(path.Join(layer, "dir1/subfolder"), 0740) 159 160 // Mock the RW layer 161 rwLayer, err := os.MkdirTemp("", "docker-changes-test") 162 assert.NilError(t, err) 163 defer os.RemoveAll(rwLayer) 164 165 // Create a folder in RW layer 166 dir1 := path.Join(rwLayer, "dir1") 167 os.MkdirAll(dir1, 0740) 168 deletedFile := path.Join(dir1, ".wh.file1-2") 169 os.WriteFile(deletedFile, []byte{}, 0600) 170 modifiedFile := path.Join(dir1, "file1-1") 171 os.WriteFile(modifiedFile, []byte{0x00}, 01444) 172 // Let's add a subfolder for a newFile 173 subfolder := path.Join(dir1, "subfolder") 174 os.MkdirAll(subfolder, 0740) 175 newFile := path.Join(subfolder, "newFile") 176 os.WriteFile(newFile, []byte{}, 0740) 177 178 changes, err := Changes([]string{layer}, rwLayer) 179 assert.NilError(t, err) 180 181 expectedChanges := []Change{ 182 {filepath.FromSlash("/dir1"), ChangeModify}, 183 {filepath.FromSlash("/dir1/file1-1"), ChangeModify}, 184 {filepath.FromSlash("/dir1/file1-2"), ChangeDelete}, 185 {filepath.FromSlash("/dir1/subfolder"), ChangeModify}, 186 {filepath.FromSlash("/dir1/subfolder/newFile"), ChangeAdd}, 187 } 188 checkChanges(expectedChanges, changes, t) 189 } 190 191 // See https://github.com/docker/docker/pull/13590 192 func TestChangesWithChangesGH13590(t *testing.T) { 193 // TODO Windows. Needs further investigation to identify the failure 194 if runtime.GOOS == "windows" { 195 t.Skip("needs more investigation") 196 } 197 baseLayer, err := os.MkdirTemp("", "docker-changes-test.") 198 assert.NilError(t, err) 199 defer os.RemoveAll(baseLayer) 200 201 dir3 := path.Join(baseLayer, "dir1/dir2/dir3") 202 os.MkdirAll(dir3, 07400) 203 204 file := path.Join(dir3, "file.txt") 205 os.WriteFile(file, []byte("hello"), 0666) 206 207 layer, err := os.MkdirTemp("", "docker-changes-test2.") 208 assert.NilError(t, err) 209 defer os.RemoveAll(layer) 210 211 // Test creating a new file 212 if err := copyDir(baseLayer+"/dir1", layer+"/"); err != nil { 213 t.Fatalf("Cmd failed: %q", err) 214 } 215 216 os.Remove(path.Join(layer, "dir1/dir2/dir3/file.txt")) 217 file = path.Join(layer, "dir1/dir2/dir3/file1.txt") 218 os.WriteFile(file, []byte("bye"), 0666) 219 220 changes, err := Changes([]string{baseLayer}, layer) 221 assert.NilError(t, err) 222 223 expectedChanges := []Change{ 224 {"/dir1/dir2/dir3", ChangeModify}, 225 {"/dir1/dir2/dir3/file1.txt", ChangeAdd}, 226 } 227 checkChanges(expectedChanges, changes, t) 228 229 // Now test changing a file 230 layer, err = os.MkdirTemp("", "docker-changes-test3.") 231 assert.NilError(t, err) 232 defer os.RemoveAll(layer) 233 234 if err := copyDir(baseLayer+"/dir1", layer+"/"); err != nil { 235 t.Fatalf("Cmd failed: %q", err) 236 } 237 238 file = path.Join(layer, "dir1/dir2/dir3/file.txt") 239 os.WriteFile(file, []byte("bye"), 0666) 240 241 changes, err = Changes([]string{baseLayer}, layer) 242 assert.NilError(t, err) 243 244 expectedChanges = []Change{ 245 {"/dir1/dir2/dir3/file.txt", ChangeModify}, 246 } 247 checkChanges(expectedChanges, changes, t) 248 } 249 250 // Create a directory, copy it, make sure we report no changes between the two 251 func TestChangesDirsEmpty(t *testing.T) { 252 // Note we parse kernel.GetKernelVersion rather than system.GetOSVersion 253 // as test binaries aren't manifested, so would otherwise report the wrong 254 // build number. 255 if runtime.GOOS == "windows" { 256 v, err := kernel.GetKernelVersion() 257 assert.NilError(t, err) 258 build, _ := strconv.Atoi(strings.Split(strings.SplitN(v.String(), " ", 3)[2][1:], ".")[0]) 259 if build >= osversion.V19H1 { 260 t.Skip("FIXME: broken on Windows 1903 and up; see #39846") 261 } 262 } 263 264 src, err := os.MkdirTemp("", "docker-changes-test") 265 assert.NilError(t, err) 266 defer os.RemoveAll(src) 267 createSampleDir(t, src) 268 dst := src + "-copy" 269 err = copyDir(src, dst) 270 assert.NilError(t, err) 271 defer os.RemoveAll(dst) 272 changes, err := ChangesDirs(dst, src) 273 assert.NilError(t, err) 274 275 if len(changes) != 0 { 276 t.Fatalf("Reported changes for identical dirs: %v", changes) 277 } 278 os.RemoveAll(src) 279 os.RemoveAll(dst) 280 } 281 282 func mutateSampleDir(t *testing.T, root string) { 283 // Remove a regular file 284 err := os.RemoveAll(path.Join(root, "file1")) 285 assert.NilError(t, err) 286 287 // Remove a directory 288 err = os.RemoveAll(path.Join(root, "dir1")) 289 assert.NilError(t, err) 290 291 // Remove a symlink 292 err = os.RemoveAll(path.Join(root, "symlink1")) 293 assert.NilError(t, err) 294 295 // Rewrite a file 296 err = os.WriteFile(path.Join(root, "file2"), []byte("fileNN\n"), 0777) 297 assert.NilError(t, err) 298 299 // Replace a file 300 err = os.RemoveAll(path.Join(root, "file3")) 301 assert.NilError(t, err) 302 err = os.WriteFile(path.Join(root, "file3"), []byte("fileMM\n"), 0404) 303 assert.NilError(t, err) 304 305 // Touch file 306 err = system.Chtimes(path.Join(root, "file4"), time.Now().Add(time.Second), time.Now().Add(time.Second)) 307 assert.NilError(t, err) 308 309 // Replace file with dir 310 err = os.RemoveAll(path.Join(root, "file5")) 311 assert.NilError(t, err) 312 err = os.MkdirAll(path.Join(root, "file5"), 0666) 313 assert.NilError(t, err) 314 315 // Create new file 316 err = os.WriteFile(path.Join(root, "filenew"), []byte("filenew\n"), 0777) 317 assert.NilError(t, err) 318 319 // Create new dir 320 err = os.MkdirAll(path.Join(root, "dirnew"), 0766) 321 assert.NilError(t, err) 322 323 // Create a new symlink 324 err = os.Symlink("targetnew", path.Join(root, "symlinknew")) 325 assert.NilError(t, err) 326 327 // Change a symlink 328 err = os.RemoveAll(path.Join(root, "symlink2")) 329 assert.NilError(t, err) 330 331 err = os.Symlink("target2change", path.Join(root, "symlink2")) 332 assert.NilError(t, err) 333 334 // Replace dir with file 335 err = os.RemoveAll(path.Join(root, "dir2")) 336 assert.NilError(t, err) 337 err = os.WriteFile(path.Join(root, "dir2"), []byte("dir2\n"), 0777) 338 assert.NilError(t, err) 339 340 // Touch dir 341 err = system.Chtimes(path.Join(root, "dir3"), time.Now().Add(time.Second), time.Now().Add(time.Second)) 342 assert.NilError(t, err) 343 } 344 345 func TestChangesDirsMutated(t *testing.T) { 346 // Note we parse kernel.GetKernelVersion rather than system.GetOSVersion 347 // as test binaries aren't manifested, so would otherwise report the wrong 348 // build number. 349 if runtime.GOOS == "windows" { 350 v, err := kernel.GetKernelVersion() 351 assert.NilError(t, err) 352 build, _ := strconv.Atoi(strings.Split(strings.SplitN(v.String(), " ", 3)[2][1:], ".")[0]) 353 if build >= osversion.V19H1 { 354 t.Skip("FIXME: broken on Windows 1903 and up; see #39846") 355 } 356 } 357 358 src, err := os.MkdirTemp("", "docker-changes-test") 359 assert.NilError(t, err) 360 createSampleDir(t, src) 361 dst := src + "-copy" 362 err = copyDir(src, dst) 363 assert.NilError(t, err) 364 defer os.RemoveAll(src) 365 defer os.RemoveAll(dst) 366 367 mutateSampleDir(t, dst) 368 369 changes, err := ChangesDirs(dst, src) 370 assert.NilError(t, err) 371 372 sort.Sort(changesByPath(changes)) 373 374 expectedChanges := []Change{ 375 {filepath.FromSlash("/dir1"), ChangeDelete}, 376 {filepath.FromSlash("/dir2"), ChangeModify}, 377 } 378 379 // Note there is slight difference between the Linux and Windows 380 // implementations here. Due to https://github.com/moby/moby/issues/9874, 381 // and the fix at https://github.com/moby/moby/pull/11422, Linux does not 382 // consider a change to the directory time as a change. Windows on NTFS 383 // does. See https://github.com/moby/moby/pull/37982 for more information. 384 // 385 // Note also: https://github.com/moby/moby/pull/37982#discussion_r223523114 386 // that differences are ordered in the way the test is currently written, hence 387 // this is in the middle of the list of changes rather than at the start or 388 // end. Potentially can be addressed later. 389 if runtime.GOOS == "windows" { 390 expectedChanges = append(expectedChanges, Change{filepath.FromSlash("/dir3"), ChangeModify}) 391 } 392 393 expectedChanges = append(expectedChanges, []Change{ 394 {filepath.FromSlash("/dirnew"), ChangeAdd}, 395 {filepath.FromSlash("/file1"), ChangeDelete}, 396 {filepath.FromSlash("/file2"), ChangeModify}, 397 {filepath.FromSlash("/file3"), ChangeModify}, 398 {filepath.FromSlash("/file4"), ChangeModify}, 399 {filepath.FromSlash("/file5"), ChangeModify}, 400 {filepath.FromSlash("/filenew"), ChangeAdd}, 401 {filepath.FromSlash("/symlink1"), ChangeDelete}, 402 {filepath.FromSlash("/symlink2"), ChangeModify}, 403 {filepath.FromSlash("/symlinknew"), ChangeAdd}, 404 }...) 405 406 for i := 0; i < max(len(changes), len(expectedChanges)); i++ { 407 if i >= len(expectedChanges) { 408 t.Fatalf("unexpected change %s\n", changes[i].String()) 409 } 410 if i >= len(changes) { 411 t.Fatalf("no change for expected change %s\n", expectedChanges[i].String()) 412 } 413 if changes[i].Path == expectedChanges[i].Path { 414 if changes[i] != expectedChanges[i] { 415 t.Fatalf("Wrong change for %s, expected %s, got %s\n", changes[i].Path, changes[i].String(), expectedChanges[i].String()) 416 } 417 } else if changes[i].Path < expectedChanges[i].Path { 418 t.Fatalf("unexpected change %q %q\n", changes[i].String(), expectedChanges[i].Path) 419 } else { 420 t.Fatalf("no change for expected change %s != %s\n", expectedChanges[i].String(), changes[i].String()) 421 } 422 } 423 } 424 425 func TestApplyLayer(t *testing.T) { 426 // TODO Windows. This is very close to working, but it fails with changes 427 // to \symlinknew and \symlink2. The destination has an updated 428 // Access/Modify/Change/Birth date to the source (~3/100th sec different). 429 // Needs further investigation as to why, but I currently believe this is 430 // just the way NTFS works. I don't think it's a bug in this test or archive. 431 if runtime.GOOS == "windows" { 432 t.Skip("needs further investigation") 433 } 434 src, err := os.MkdirTemp("", "docker-changes-test") 435 assert.NilError(t, err) 436 createSampleDir(t, src) 437 defer os.RemoveAll(src) 438 dst := src + "-copy" 439 err = copyDir(src, dst) 440 assert.NilError(t, err) 441 mutateSampleDir(t, dst) 442 defer os.RemoveAll(dst) 443 444 changes, err := ChangesDirs(dst, src) 445 assert.NilError(t, err) 446 447 layer, err := ExportChanges(dst, changes, nil, nil) 448 assert.NilError(t, err) 449 450 layerCopy, err := NewTempArchive(layer, "") 451 assert.NilError(t, err) 452 453 _, err = ApplyLayer(src, layerCopy) 454 assert.NilError(t, err) 455 456 changes2, err := ChangesDirs(src, dst) 457 assert.NilError(t, err) 458 459 if len(changes2) != 0 { 460 t.Fatalf("Unexpected differences after reapplying mutation: %v", changes2) 461 } 462 } 463 464 func TestChangesSizeWithHardlinks(t *testing.T) { 465 // TODO Windows. Needs further investigation. Likely in ChangeSizes not 466 // coping correctly with hardlinks on Windows. 467 if runtime.GOOS == "windows" { 468 t.Skip("needs further investigation") 469 } 470 srcDir, err := os.MkdirTemp("", "docker-test-srcDir") 471 assert.NilError(t, err) 472 defer os.RemoveAll(srcDir) 473 474 destDir, err := os.MkdirTemp("", "docker-test-destDir") 475 assert.NilError(t, err) 476 defer os.RemoveAll(destDir) 477 478 creationSize, err := prepareUntarSourceDirectory(100, destDir, true) 479 assert.NilError(t, err) 480 481 changes, err := ChangesDirs(destDir, srcDir) 482 assert.NilError(t, err) 483 484 got := ChangesSize(destDir, changes) 485 if got != int64(creationSize) { 486 t.Errorf("Expected %d bytes of changes, got %d", creationSize, got) 487 } 488 } 489 490 func TestChangesSizeWithNoChanges(t *testing.T) { 491 size := ChangesSize("/tmp", nil) 492 if size != 0 { 493 t.Fatalf("ChangesSizes with no changes should be 0, was %d", size) 494 } 495 } 496 497 func TestChangesSizeWithOnlyDeleteChanges(t *testing.T) { 498 changes := []Change{ 499 {Path: "deletedPath", Kind: ChangeDelete}, 500 } 501 size := ChangesSize("/tmp", changes) 502 if size != 0 { 503 t.Fatalf("ChangesSizes with only delete changes should be 0, was %d", size) 504 } 505 } 506 507 func TestChangesSize(t *testing.T) { 508 parentPath, err := os.MkdirTemp("", "docker-changes-test") 509 assert.NilError(t, err) 510 defer os.RemoveAll(parentPath) 511 addition := path.Join(parentPath, "addition") 512 err = os.WriteFile(addition, []byte{0x01, 0x01, 0x01}, 0744) 513 assert.NilError(t, err) 514 modification := path.Join(parentPath, "modification") 515 err = os.WriteFile(modification, []byte{0x01, 0x01, 0x01}, 0744) 516 assert.NilError(t, err) 517 518 changes := []Change{ 519 {Path: "addition", Kind: ChangeAdd}, 520 {Path: "modification", Kind: ChangeModify}, 521 } 522 size := ChangesSize(parentPath, changes) 523 if size != 6 { 524 t.Fatalf("Expected 6 bytes of changes, got %d", size) 525 } 526 } 527 528 func checkChanges(expectedChanges, changes []Change, t *testing.T) { 529 skip.If(t, runtime.GOOS != "windows" && os.Getuid() != 0, "skipping test that requires root") 530 sort.Sort(changesByPath(expectedChanges)) 531 sort.Sort(changesByPath(changes)) 532 for i := 0; i < max(len(changes), len(expectedChanges)); i++ { 533 if i >= len(expectedChanges) { 534 t.Fatalf("unexpected change %s\n", changes[i].String()) 535 } 536 if i >= len(changes) { 537 t.Fatalf("no change for expected change %s\n", expectedChanges[i].String()) 538 } 539 if changes[i].Path == expectedChanges[i].Path { 540 if changes[i] != expectedChanges[i] { 541 t.Fatalf("Wrong change for %s, expected %s, got %s\n", changes[i].Path, changes[i].String(), expectedChanges[i].String()) 542 } 543 } else if changes[i].Path < expectedChanges[i].Path { 544 t.Fatalf("unexpected change %s\n", changes[i].String()) 545 } else { 546 t.Fatalf("no change for expected change %s != %s\n", expectedChanges[i].String(), changes[i].String()) 547 } 548 } 549 }