github.com/lacework-dev/go-moby@v20.10.12+incompatible/pkg/idtools/idtools_unix_test.go (about) 1 // +build !windows 2 3 package idtools // import "github.com/docker/docker/pkg/idtools" 4 5 import ( 6 "fmt" 7 "io/ioutil" 8 "os" 9 "os/user" 10 "path/filepath" 11 "testing" 12 13 "golang.org/x/sys/unix" 14 "gotest.tools/v3/assert" 15 is "gotest.tools/v3/assert/cmp" 16 "gotest.tools/v3/skip" 17 ) 18 19 const ( 20 tempUser = "tempuser" 21 ) 22 23 type node struct { 24 uid int 25 gid int 26 } 27 28 func TestMkdirAllAndChown(t *testing.T) { 29 RequiresRoot(t) 30 dirName, err := ioutil.TempDir("", "mkdirall") 31 if err != nil { 32 t.Fatalf("Couldn't create temp dir: %v", err) 33 } 34 defer os.RemoveAll(dirName) 35 36 testTree := map[string]node{ 37 "usr": {0, 0}, 38 "usr/bin": {0, 0}, 39 "lib": {33, 33}, 40 "lib/x86_64": {45, 45}, 41 "lib/x86_64/share": {1, 1}, 42 } 43 44 if err := buildTree(dirName, testTree); err != nil { 45 t.Fatal(err) 46 } 47 48 // test adding a directory to a pre-existing dir; only the new dir is owned by the uid/gid 49 if err := MkdirAllAndChown(filepath.Join(dirName, "usr", "share"), 0755, Identity{UID: 99, GID: 99}); err != nil { 50 t.Fatal(err) 51 } 52 testTree["usr/share"] = node{99, 99} 53 verifyTree, err := readTree(dirName, "") 54 if err != nil { 55 t.Fatal(err) 56 } 57 if err := compareTrees(testTree, verifyTree); err != nil { 58 t.Fatal(err) 59 } 60 61 // test 2-deep new directories--both should be owned by the uid/gid pair 62 if err := MkdirAllAndChown(filepath.Join(dirName, "lib", "some", "other"), 0755, Identity{UID: 101, GID: 101}); err != nil { 63 t.Fatal(err) 64 } 65 testTree["lib/some"] = node{101, 101} 66 testTree["lib/some/other"] = node{101, 101} 67 verifyTree, err = readTree(dirName, "") 68 if err != nil { 69 t.Fatal(err) 70 } 71 if err := compareTrees(testTree, verifyTree); err != nil { 72 t.Fatal(err) 73 } 74 75 // test a directory that already exists; should be chowned, but nothing else 76 if err := MkdirAllAndChown(filepath.Join(dirName, "usr"), 0755, Identity{UID: 102, GID: 102}); err != nil { 77 t.Fatal(err) 78 } 79 testTree["usr"] = node{102, 102} 80 verifyTree, err = readTree(dirName, "") 81 if err != nil { 82 t.Fatal(err) 83 } 84 if err := compareTrees(testTree, verifyTree); err != nil { 85 t.Fatal(err) 86 } 87 } 88 89 func TestMkdirAllAndChownNew(t *testing.T) { 90 RequiresRoot(t) 91 dirName, err := ioutil.TempDir("", "mkdirnew") 92 assert.NilError(t, err) 93 defer os.RemoveAll(dirName) 94 95 testTree := map[string]node{ 96 "usr": {0, 0}, 97 "usr/bin": {0, 0}, 98 "lib": {33, 33}, 99 "lib/x86_64": {45, 45}, 100 "lib/x86_64/share": {1, 1}, 101 } 102 assert.NilError(t, buildTree(dirName, testTree)) 103 104 // test adding a directory to a pre-existing dir; only the new dir is owned by the uid/gid 105 err = MkdirAllAndChownNew(filepath.Join(dirName, "usr", "share"), 0755, Identity{UID: 99, GID: 99}) 106 assert.NilError(t, err) 107 108 testTree["usr/share"] = node{99, 99} 109 verifyTree, err := readTree(dirName, "") 110 assert.NilError(t, err) 111 assert.NilError(t, compareTrees(testTree, verifyTree)) 112 113 // test 2-deep new directories--both should be owned by the uid/gid pair 114 err = MkdirAllAndChownNew(filepath.Join(dirName, "lib", "some", "other"), 0755, Identity{UID: 101, GID: 101}) 115 assert.NilError(t, err) 116 testTree["lib/some"] = node{101, 101} 117 testTree["lib/some/other"] = node{101, 101} 118 verifyTree, err = readTree(dirName, "") 119 assert.NilError(t, err) 120 assert.NilError(t, compareTrees(testTree, verifyTree)) 121 122 // test a directory that already exists; should NOT be chowned 123 err = MkdirAllAndChownNew(filepath.Join(dirName, "usr"), 0755, Identity{UID: 102, GID: 102}) 124 assert.NilError(t, err) 125 verifyTree, err = readTree(dirName, "") 126 assert.NilError(t, err) 127 assert.NilError(t, compareTrees(testTree, verifyTree)) 128 } 129 130 func TestMkdirAndChown(t *testing.T) { 131 RequiresRoot(t) 132 dirName, err := ioutil.TempDir("", "mkdir") 133 if err != nil { 134 t.Fatalf("Couldn't create temp dir: %v", err) 135 } 136 defer os.RemoveAll(dirName) 137 138 testTree := map[string]node{ 139 "usr": {0, 0}, 140 } 141 if err := buildTree(dirName, testTree); err != nil { 142 t.Fatal(err) 143 } 144 145 // test a directory that already exists; should just chown to the requested uid/gid 146 if err := MkdirAndChown(filepath.Join(dirName, "usr"), 0755, Identity{UID: 99, GID: 99}); err != nil { 147 t.Fatal(err) 148 } 149 testTree["usr"] = node{99, 99} 150 verifyTree, err := readTree(dirName, "") 151 if err != nil { 152 t.Fatal(err) 153 } 154 if err := compareTrees(testTree, verifyTree); err != nil { 155 t.Fatal(err) 156 } 157 158 // create a subdir under a dir which doesn't exist--should fail 159 if err := MkdirAndChown(filepath.Join(dirName, "usr", "bin", "subdir"), 0755, Identity{UID: 102, GID: 102}); err == nil { 160 t.Fatalf("Trying to create a directory with Mkdir where the parent doesn't exist should have failed") 161 } 162 163 // create a subdir under an existing dir; should only change the ownership of the new subdir 164 if err := MkdirAndChown(filepath.Join(dirName, "usr", "bin"), 0755, Identity{UID: 102, GID: 102}); err != nil { 165 t.Fatal(err) 166 } 167 testTree["usr/bin"] = node{102, 102} 168 verifyTree, err = readTree(dirName, "") 169 if err != nil { 170 t.Fatal(err) 171 } 172 if err := compareTrees(testTree, verifyTree); err != nil { 173 t.Fatal(err) 174 } 175 } 176 177 func buildTree(base string, tree map[string]node) error { 178 for path, node := range tree { 179 fullPath := filepath.Join(base, path) 180 if err := os.MkdirAll(fullPath, 0755); err != nil { 181 return fmt.Errorf("Couldn't create path: %s; error: %v", fullPath, err) 182 } 183 if err := os.Chown(fullPath, node.uid, node.gid); err != nil { 184 return fmt.Errorf("Couldn't chown path: %s; error: %v", fullPath, err) 185 } 186 } 187 return nil 188 } 189 190 func readTree(base, root string) (map[string]node, error) { 191 tree := make(map[string]node) 192 193 dirInfos, err := ioutil.ReadDir(base) 194 if err != nil { 195 return nil, fmt.Errorf("Couldn't read directory entries for %q: %v", base, err) 196 } 197 198 for _, info := range dirInfos { 199 s := &unix.Stat_t{} 200 if err := unix.Stat(filepath.Join(base, info.Name()), s); err != nil { 201 return nil, fmt.Errorf("Can't stat file %q: %v", filepath.Join(base, info.Name()), err) 202 } 203 tree[filepath.Join(root, info.Name())] = node{int(s.Uid), int(s.Gid)} 204 if info.IsDir() { 205 // read the subdirectory 206 subtree, err := readTree(filepath.Join(base, info.Name()), filepath.Join(root, info.Name())) 207 if err != nil { 208 return nil, err 209 } 210 for path, nodeinfo := range subtree { 211 tree[path] = nodeinfo 212 } 213 } 214 } 215 return tree, nil 216 } 217 218 func compareTrees(left, right map[string]node) error { 219 if len(left) != len(right) { 220 return fmt.Errorf("Trees aren't the same size") 221 } 222 for path, nodeLeft := range left { 223 if nodeRight, ok := right[path]; ok { 224 if nodeRight.uid != nodeLeft.uid || nodeRight.gid != nodeLeft.gid { 225 // mismatch 226 return fmt.Errorf("mismatched ownership for %q: expected: %d:%d, got: %d:%d", path, 227 nodeLeft.uid, nodeLeft.gid, nodeRight.uid, nodeRight.gid) 228 } 229 continue 230 } 231 return fmt.Errorf("right tree didn't contain path %q", path) 232 } 233 return nil 234 } 235 236 func delUser(t *testing.T, name string) { 237 _, err := execCmd("userdel", name) 238 assert.Check(t, err) 239 } 240 241 func TestParseSubidFileWithNewlinesAndComments(t *testing.T) { 242 tmpDir, err := ioutil.TempDir("", "parsesubid") 243 if err != nil { 244 t.Fatal(err) 245 } 246 fnamePath := filepath.Join(tmpDir, "testsubuid") 247 fcontent := `tss:100000:65536 248 # empty default subuid/subgid file 249 250 dockremap:231072:65536` 251 if err := ioutil.WriteFile(fnamePath, []byte(fcontent), 0644); err != nil { 252 t.Fatal(err) 253 } 254 ranges, err := parseSubidFile(fnamePath, "dockremap") 255 if err != nil { 256 t.Fatal(err) 257 } 258 if len(ranges) != 1 { 259 t.Fatalf("wanted 1 element in ranges, got %d instead", len(ranges)) 260 } 261 if ranges[0].Start != 231072 { 262 t.Fatalf("wanted 231072, got %d instead", ranges[0].Start) 263 } 264 if ranges[0].Length != 65536 { 265 t.Fatalf("wanted 65536, got %d instead", ranges[0].Length) 266 } 267 } 268 269 func TestGetRootUIDGID(t *testing.T) { 270 uidMap := []IDMap{ 271 { 272 ContainerID: 0, 273 HostID: os.Getuid(), 274 Size: 1, 275 }, 276 } 277 gidMap := []IDMap{ 278 { 279 ContainerID: 0, 280 HostID: os.Getgid(), 281 Size: 1, 282 }, 283 } 284 285 uid, gid, err := GetRootUIDGID(uidMap, gidMap) 286 assert.Check(t, err) 287 assert.Check(t, is.Equal(os.Geteuid(), uid)) 288 assert.Check(t, is.Equal(os.Getegid(), gid)) 289 290 uidMapError := []IDMap{ 291 { 292 ContainerID: 1, 293 HostID: os.Getuid(), 294 Size: 1, 295 }, 296 } 297 _, _, err = GetRootUIDGID(uidMapError, gidMap) 298 assert.Check(t, is.Error(err, "Container ID 0 cannot be mapped to a host ID")) 299 } 300 301 func TestToContainer(t *testing.T) { 302 uidMap := []IDMap{ 303 { 304 ContainerID: 2, 305 HostID: 2, 306 Size: 1, 307 }, 308 } 309 310 containerID, err := toContainer(2, uidMap) 311 assert.Check(t, err) 312 assert.Check(t, is.Equal(uidMap[0].ContainerID, containerID)) 313 } 314 315 func TestNewIDMappings(t *testing.T) { 316 RequiresRoot(t) 317 _, _, err := AddNamespaceRangesUser(tempUser) 318 assert.Check(t, err) 319 defer delUser(t, tempUser) 320 321 tempUser, err := user.Lookup(tempUser) 322 assert.Check(t, err) 323 324 idMapping, err := NewIdentityMapping(tempUser.Username) 325 assert.Check(t, err) 326 327 rootUID, rootGID, err := GetRootUIDGID(idMapping.UIDs(), idMapping.GIDs()) 328 assert.Check(t, err) 329 330 dirName, err := ioutil.TempDir("", "mkdirall") 331 assert.Check(t, err, "Couldn't create temp directory") 332 defer os.RemoveAll(dirName) 333 334 err = MkdirAllAndChown(dirName, 0700, Identity{UID: rootUID, GID: rootGID}) 335 assert.Check(t, err, "Couldn't change ownership of file path. Got error") 336 assert.Check(t, CanAccess(dirName, idMapping.RootPair()), fmt.Sprintf("Unable to access %s directory with user UID:%d and GID:%d", dirName, rootUID, rootGID)) 337 } 338 339 func TestLookupUserAndGroup(t *testing.T) { 340 RequiresRoot(t) 341 uid, gid, err := AddNamespaceRangesUser(tempUser) 342 assert.Check(t, err) 343 defer delUser(t, tempUser) 344 345 fetchedUser, err := LookupUser(tempUser) 346 assert.Check(t, err) 347 348 fetchedUserByID, err := LookupUID(uid) 349 assert.Check(t, err) 350 assert.Check(t, is.DeepEqual(fetchedUserByID, fetchedUser)) 351 352 fetchedGroup, err := LookupGroup(tempUser) 353 assert.Check(t, err) 354 355 fetchedGroupByID, err := LookupGID(gid) 356 assert.Check(t, err) 357 assert.Check(t, is.DeepEqual(fetchedGroupByID, fetchedGroup)) 358 } 359 360 func TestLookupUserAndGroupThatDoesNotExist(t *testing.T) { 361 fakeUser := "fakeuser" 362 _, err := LookupUser(fakeUser) 363 assert.Check(t, is.Error(err, "getent unable to find entry \""+fakeUser+"\" in passwd database")) 364 365 _, err = LookupUID(-1) 366 assert.Check(t, is.ErrorContains(err, "")) 367 368 fakeGroup := "fakegroup" 369 _, err = LookupGroup(fakeGroup) 370 assert.Check(t, is.Error(err, "getent unable to find entry \""+fakeGroup+"\" in group database")) 371 372 _, err = LookupGID(-1) 373 assert.Check(t, is.ErrorContains(err, "")) 374 } 375 376 // TestMkdirIsNotDir checks that mkdirAs() function (used by MkdirAll...) 377 // returns a correct error in case a directory which it is about to create 378 // already exists but is a file (rather than a directory). 379 func TestMkdirIsNotDir(t *testing.T) { 380 file, err := ioutil.TempFile("", t.Name()) 381 if err != nil { 382 t.Fatalf("Couldn't create temp dir: %v", err) 383 } 384 defer os.Remove(file.Name()) 385 386 err = mkdirAs(file.Name(), 0755, Identity{UID: 0, GID: 0}, false, false) 387 assert.Check(t, is.Error(err, "mkdir "+file.Name()+": not a directory")) 388 } 389 390 func RequiresRoot(t *testing.T) { 391 skip.If(t, os.Getuid() != 0, "skipping test that requires root") 392 }