forked from kata-containers/tests
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
ci: Add test cases for CoCo image pulling without forked containerd
Additional tests are necessary to verify new feature that pulling image without forked containerd in CoCo. Fixes kata-containers#5763 Depends: kata-containers/kata-containers#7688 kata-containers/kata-containers#7676 Signed-off-by: ChengyuZhu6 <chengyu.zhu@intel.com>
- Loading branch information
1 parent
021bf58
commit eb4ed6d
Showing
3 changed files
with
219 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
155 changes: 155 additions & 0 deletions
155
integration/kubernetes/confidential/image_pulling_with_snapshotter.bats
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,155 @@ | ||
#!/usr/bin/env bats | ||
# Copyright (c) 2022 IBM Corporation | ||
# | ||
# SPDX-License-Identifier: Apache-2.0 | ||
# | ||
|
||
load "${BATS_TEST_DIRNAME}/lib.sh" | ||
load "${BATS_TEST_DIRNAME}/../../confidential/lib.sh" | ||
|
||
tag_suffix="" | ||
if [ "$(uname -m)" != "x86_64" ]; then | ||
tag_suffix="-$(uname -m)" | ||
fi | ||
|
||
# Images used on the tests. | ||
|
||
image_unsigned_protected="quay.io/kata-containers/confidential-containers:unsigned${tag_suffix}" | ||
|
||
original_kernel_params=$(get_kernel_params) | ||
# Allow to configure the runtimeClassName on pod configuration. | ||
RUNTIMECLASS="${RUNTIMECLASS:-kata}" | ||
test_tag="[cc][agent][kubernetes][containerd]" | ||
|
||
# Create the test pod. | ||
# | ||
# Note: the global $sandbox_name, $pod_config should be set | ||
# already. It also relies on $CI and $DEBUG exported by CI scripts or | ||
# the developer, to decide how to set debug flags. | ||
# | ||
create_test_pod() { | ||
local pod_config="$1" | ||
# On CI mode we only want to enable the agent debug for the case of | ||
# the test failure to obtain logs. | ||
if [ "${CI:-}" == "true" ]; then | ||
enable_full_debug | ||
elif [ "${DEBUG:-}" == "true" ]; then | ||
enable_full_debug | ||
enable_agent_console | ||
fi | ||
|
||
echo "Create the test sandbox" | ||
echo "Pod config is: $pod_config" | ||
kubernetes_create_cc_pod $pod_config | ||
} | ||
|
||
# Create a pod configuration out of a template file. | ||
# | ||
# Parameters: | ||
# $1 - the container image. | ||
# Return: | ||
# the path to the configuration file. The caller should not care about | ||
# its removal afterwards as it is created under the bats temporary | ||
# directory. | ||
# | ||
# Environment variables: | ||
# RUNTIMECLASS: set the runtimeClassName value from $RUNTIMECLASS. | ||
# | ||
new_pod_config() { | ||
local base_config="${FIXTURES_DIR}/pod-config.yaml.in" | ||
local image="$1" | ||
local index="$2" | ||
|
||
local new_config=$(mktemp "${BATS_FILE_TMPDIR}/$(basename ${base_config}).XXX") | ||
IMAGE="$image" RUNTIMECLASS="$RUNTIMECLASS" INDEX="$2" envsubst <"$base_config" >"$new_config" | ||
echo "$new_config" | ||
} | ||
|
||
setup() { | ||
start_date=$(date +"%Y-%m-%d %H:%M:%S") | ||
|
||
pod_config="$(new_pod_config "$image_simple_signed")" | ||
pod_id="" | ||
|
||
kubernetes_delete_all_cc_pods_if_any_exists || true | ||
|
||
echo "Prepare containerd for Confidential Container" | ||
SAVED_CONTAINERD_CONF_FILE="/etc/containerd/config.toml.$$" | ||
configure_cc_containerd "$SAVED_CONTAINERD_CONF_FILE" | ||
|
||
echo "Reconfigure Kata Containers" | ||
switch_image_service_offload off | ||
clear_kernel_params | ||
add_kernel_params "${original_kernel_params}" | ||
|
||
setup_proxy | ||
switch_measured_rootfs_verity_scheme none | ||
} | ||
|
||
# Check the logged messages on host have a given message. | ||
# Parameters: | ||
# $1 - the message | ||
# | ||
# Note: get the logs since the global $start_date. | ||
# | ||
assert_logs_contain() { | ||
local message="$1" | ||
# Note: with image-rs we get more that the default 1000 lines of logs | ||
journalctl -x -t kata --since "$start_date" -n 100000 | grep "$message" | ||
} | ||
|
||
@test "$test_tag Test can pull an image as a raw block disk image to guest with dm-verity enabled" { | ||
if [ "$SNAPSHOTTER" = "nydus" ]; then | ||
EXPORT_MODE="image_block_with_verity" RUNTIMECLASS="$RUNTIMECLASS" SNAPSHOTTER="nydus" configure_remote_snapshotter | ||
pod_config="$(new_pod_config "$image_unsigned_unprotected")" | ||
echo $pod_config | ||
create_test_pod "$pod_config" | ||
remove_test_image "$image_unsigned_unprotected" | ||
fi | ||
} | ||
|
||
@test "$test_tag Test can create two pods with pulling the image only once" { | ||
if [ "$SNAPSHOTTER" = "nydus" ]; then | ||
EXPORT_MODE="image_block_with_verity" RUNTIMECLASS="$RUNTIMECLASS" SNAPSHOTTER="nydus" configure_remote_snapshotter | ||
|
||
pod_config_1="$(new_pod_config "$image_unsigned_unprotected" "1")" | ||
echo $pod_config_1 | ||
create_test_pod $pod_config_1 | ||
pod_config_2="$(new_pod_config "$image_unsigned_unprotected" "2")" | ||
echo $pod_config_2 | ||
create_test_pod $pod_config_2 | ||
|
||
pull_times=$(journalctl -g "PullImage \"$image_unsigned_unprotected\" with snapshotter nydus" | wc -l) | ||
[ ${#pull_times[@]} -eq 1 ] | ||
remove_test_image "$image_unsigned_unprotected" | ||
fi | ||
} | ||
|
||
@test "$test_tag Test can pull an image inside the guest with remote-snapshotter" { | ||
switch_image_service_offload on | ||
if [ "$SNAPSHOTTER" = "nydus" ]; then | ||
EXPORT_MODE="image_guest_pull" RUNTIMECLASS="$RUNTIMECLASS" SNAPSHOTTER="nydus" configure_remote_snapshotter | ||
create_test_pod | ||
remove_test_image "$image_unsigned_unprotected" | ||
fi | ||
} | ||
|
||
teardown() { | ||
# Print the logs and cleanup resources. | ||
echo "-- Kata logs:" | ||
sudo journalctl -xe -t kata --since "$start_date" -n 100000 | ||
|
||
# Allow to not destroy the environment if you are developing/debugging | ||
# tests. | ||
if [[ "${CI:-false}" == "false" && "${DEBUG:-}" == true ]]; then | ||
echo "Leaving changes and created resources untouched" | ||
return | ||
fi | ||
|
||
kubernetes_delete_all_cc_pods_if_any_exists || true | ||
clear_kernel_params | ||
add_kernel_params "${original_kernel_params}" | ||
switch_image_service_offload off | ||
remove_nydus_snapshotter_from_containerd | ||
disable_full_debug | ||
} |