1
0
mirror of https://github.com/containers/youki synced 2024-11-22 17:02:00 +01:00

Remove unnecessary chdir (#2780)

* Remove unnecessary chdir

Co-authored-by: jiaxiao zhou <jiazho@microsoft.com>
Co-authored-by: Jorge Prendes <jorge.prendes@gmail.com>
Signed-off-by: utam0k <k0ma@utam0k.jp>

* fixup! Remove unnecessary chdir

Signed-off-by: utam0k <k0ma@utam0k.jp>

* fixup! Remove unnecessary chdir

Signed-off-by: utam0k <k0ma@utam0k.jp>

* fixup! Remove unnecessary chdir

Signed-off-by: utam0k <k0ma@utam0k.jp>

* Enable run_hooks to be passed cwd

Signed-off-by: utam0k <k0ma@utam0k.jp>

* fixup! Enable run_hooks to be passed cwd

Signed-off-by: utam0k <k0ma@utam0k.jp>

* fixup! Enable run_hooks to be passed cwd

Signed-off-by: utam0k <k0ma@utam0k.jp>

---------

Signed-off-by: utam0k <k0ma@utam0k.jp>
Co-authored-by: jiaxiao zhou <jiazho@microsoft.com>
Co-authored-by: Jorge Prendes <jorge.prendes@gmail.com>
This commit is contained in:
Toru Komatsu 2024-05-15 21:20:27 +09:00 committed by GitHub
parent c6fffb2c6a
commit 25edc95648
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
10 changed files with 147 additions and 122 deletions

@ -44,8 +44,7 @@ Vagrant.configure("2") do |config|
./script/setup/install-cni ./script/setup/install-cni
./script/setup/install-critools ./script/setup/install-critools
rm -rf /bin/runc /sbin/runc /usr/sbin/runc /usr/bin/runc rm -rf /bin/runc /sbin/runc /usr/sbin/runc /usr/bin/runc
ln -s /vagrant/youki/youki /usr/bin/runc
cp /vagrant/youki/youki /usr/bin/runc
SHELL SHELL
end end

@ -1,3 +1,9 @@
use std::{fs, io::Write, os::unix::prelude::RawFd, path::PathBuf, rc::Rc};
use libcgroups::common::CgroupManager;
use nix::unistd::Pid;
use oci_spec::runtime::Spec;
use super::{Container, ContainerStatus}; use super::{Container, ContainerStatus};
use crate::{ use crate::{
error::{LibcontainerError, MissingSpecError}, error::{LibcontainerError, MissingSpecError},
@ -13,10 +19,6 @@ use crate::{
utils, utils,
workload::Executor, workload::Executor,
}; };
use libcgroups::common::CgroupManager;
use nix::unistd::Pid;
use oci_spec::runtime::Spec;
use std::{fs, io::Write, os::unix::prelude::RawFd, path::PathBuf, rc::Rc};
pub(super) struct ContainerBuilderImpl { pub(super) struct ContainerBuilderImpl {
/// Flag indicating if an init or a tenant container should be created /// Flag indicating if an init or a tenant container should be created
@ -82,7 +84,11 @@ impl ContainerBuilderImpl {
if matches!(self.container_type, ContainerType::InitContainer) { if matches!(self.container_type, ContainerType::InitContainer) {
if let Some(hooks) = self.spec.hooks() { if let Some(hooks) = self.spec.hooks() {
hooks::run_hooks(hooks.create_runtime().as_ref(), self.container.as_ref())? hooks::run_hooks(
hooks.create_runtime().as_ref(),
self.container.as_ref(),
None,
)?
} }
} }

@ -94,10 +94,12 @@ impl Container {
})?; })?;
if let Some(hooks) = config.hooks.as_ref() { if let Some(hooks) = config.hooks.as_ref() {
hooks::run_hooks(hooks.poststop().as_ref(), Some(self)).map_err(|err| { hooks::run_hooks(hooks.poststop().as_ref(), Some(self), None).map_err(
|err| {
tracing::error!(err = ?err, "failed to run post stop hooks"); tracing::error!(err = ?err, "failed to run post stop hooks");
err err
})?; },
)?;
} }
} }
Err(err) => { Err(err) => {

@ -1,3 +1,6 @@
use nix::sys::signal;
use super::{Container, ContainerStatus};
use crate::{ use crate::{
config::YoukiConfig, config::YoukiConfig,
error::LibcontainerError, error::LibcontainerError,
@ -5,9 +8,6 @@ use crate::{
notify_socket::{NotifySocket, NOTIFY_FILE}, notify_socket::{NotifySocket, NOTIFY_FILE},
}; };
use super::{Container, ContainerStatus};
use nix::{sys::signal, unistd};
impl Container { impl Container {
/// Starts a previously created container /// Starts a previously created container
/// ///
@ -49,7 +49,7 @@ impl Container {
// While prestart is marked as deprecated in the OCI spec, the docker and integration test still // While prestart is marked as deprecated in the OCI spec, the docker and integration test still
// uses it. // uses it.
#[allow(deprecated)] #[allow(deprecated)]
hooks::run_hooks(hooks.prestart().as_ref(), Some(self)).map_err(|err| { hooks::run_hooks(hooks.prestart().as_ref(), Some(self), None).map_err(|err| {
tracing::error!("failed to run pre start hooks: {}", err); tracing::error!("failed to run pre start hooks: {}", err);
// In the case where prestart hook fails, the runtime must // In the case where prestart hook fails, the runtime must
// stop the container before generating an error and exiting. // stop the container before generating an error and exiting.
@ -59,11 +59,6 @@ impl Container {
})?; })?;
} }
unistd::chdir(self.root.as_os_str()).map_err(|err| {
tracing::error!("failed to change directory to container root: {}", err);
LibcontainerError::OtherSyscall(err)
})?;
let mut notify_socket = NotifySocket::new(self.root.join(NOTIFY_FILE)); let mut notify_socket = NotifySocket::new(self.root.join(NOTIFY_FILE));
notify_socket.notify_container_start()?; notify_socket.notify_container_start()?;
self.set_status(ContainerStatus::Running) self.set_status(ContainerStatus::Running)
@ -76,10 +71,12 @@ impl Container {
// Run post start hooks. It runs after the container process is started. // Run post start hooks. It runs after the container process is started.
// It is called in the runtime namespace. // It is called in the runtime namespace.
if let Some(hooks) = config.hooks.as_ref() { if let Some(hooks) = config.hooks.as_ref() {
hooks::run_hooks(hooks.poststart().as_ref(), Some(self)).map_err(|err| { hooks::run_hooks(hooks.poststart().as_ref(), Some(self), Some(&self.root)).map_err(
|err| {
tracing::error!("failed to run post start hooks: {}", err); tracing::error!("failed to run post start hooks: {}", err);
err err
})?; },
)?;
} }
Ok(()) Ok(())

@ -1,4 +1,3 @@
use nix::unistd;
use oci_spec::runtime::Spec; use oci_spec::runtime::Spec;
use std::{ use std::{
fs, fs,
@ -61,14 +60,6 @@ impl InitContainerBuilder {
.set_systemd(self.use_systemd) .set_systemd(self.use_systemd)
.set_annotations(spec.annotations().clone()); .set_annotations(spec.annotations().clone());
unistd::chdir(&container_dir).map_err(|err| {
tracing::error!(
?container_dir,
?err,
"failed to chdir into the container directory"
);
LibcontainerError::OtherSyscall(err)
})?;
let notify_path = container_dir.join(NOTIFY_FILE); let notify_path = container_dir.join(NOTIFY_FILE);
// convert path of root file system of the container to absolute path // convert path of root file system of the container to absolute path
let rootfs = fs::canonicalize(spec.root().as_ref().ok_or(MissingSpecError::Root)?.path()) let rootfs = fs::canonicalize(spec.root().as_ref().ok_or(MissingSpecError::Root)?.path())

@ -1,6 +1,6 @@
use caps::Capability; use caps::Capability;
use nix::fcntl::OFlag; use nix::fcntl::OFlag;
use nix::unistd::{self, close, pipe2, read, Pid}; use nix::unistd::{close, pipe2, read, Pid};
use oci_spec::runtime::{ use oci_spec::runtime::{
Capabilities as SpecCapabilities, Capability as SpecCapability, LinuxBuilder, Capabilities as SpecCapabilities, Capability as SpecCapability, LinuxBuilder,
LinuxCapabilities, LinuxCapabilitiesBuilder, LinuxNamespace, LinuxNamespaceBuilder, LinuxCapabilities, LinuxCapabilitiesBuilder, LinuxNamespace, LinuxNamespaceBuilder,
@ -108,7 +108,6 @@ impl TenantContainerBuilder {
tracing::debug!("{:#?}", spec); tracing::debug!("{:#?}", spec);
unistd::chdir(&container_dir).map_err(LibcontainerError::OtherSyscall)?;
let notify_path = Self::setup_notify_listener(&container_dir)?; let notify_path = Self::setup_notify_listener(&container_dir)?;
// convert path of root file system of the container to absolute path // convert path of root file system of the container to absolute path
let rootfs = fs::canonicalize(spec.root().as_ref().ok_or(MissingSpecError::Root)?.path()) let rootfs = fs::canonicalize(spec.root().as_ref().ok_or(MissingSpecError::Root)?.path())

@ -1,14 +1,14 @@
use nix::{sys::signal, unistd::Pid};
use oci_spec::runtime::Hook;
use std::{ use std::{
collections::HashMap, collections::HashMap,
io::ErrorKind, io::{ErrorKind, Write},
io::Write,
os::unix::prelude::CommandExt, os::unix::prelude::CommandExt,
process::{self}, path::Path,
thread, time, process, thread, time,
}; };
use nix::{sys::signal, unistd::Pid};
use oci_spec::runtime::Hook;
use crate::{container::Container, utils}; use crate::{container::Container, utils};
#[derive(Debug, thiserror::Error)] #[derive(Debug, thiserror::Error)]
@ -31,12 +31,21 @@ pub enum HookError {
type Result<T> = std::result::Result<T, HookError>; type Result<T> = std::result::Result<T, HookError>;
pub fn run_hooks(hooks: Option<&Vec<Hook>>, container: Option<&Container>) -> Result<()> { pub fn run_hooks(
hooks: Option<&Vec<Hook>>,
container: Option<&Container>,
cwd: Option<&Path>,
) -> Result<()> {
let state = &(container.ok_or(HookError::MissingContainerState)?.state); let state = &(container.ok_or(HookError::MissingContainerState)?.state);
if let Some(hooks) = hooks { if let Some(hooks) = hooks {
for hook in hooks { for hook in hooks {
let mut hook_command = process::Command::new(hook.path()); let mut hook_command = process::Command::new(hook.path());
if let Some(cwd) = cwd {
hook_command.current_dir(cwd);
}
// Based on OCI spec, the first argument of the args vector is the // Based on OCI spec, the first argument of the args vector is the
// arg0, which can be different from the path. For example, path // arg0, which can be different from the path. For example, path
// may be "/usr/bin/true" and arg0 is set to "true". However, rust // may be "/usr/bin/true" and arg0 is set to "true". However, rust
@ -165,7 +174,7 @@ mod test {
fn test_run_hook() -> Result<()> { fn test_run_hook() -> Result<()> {
{ {
let default_container: Container = Default::default(); let default_container: Container = Default::default();
run_hooks(None, Some(&default_container)).context("Failed simple test")?; run_hooks(None, Some(&default_container), None).context("Failed simple test")?;
} }
{ {
@ -174,7 +183,7 @@ mod test {
let hook = HookBuilder::default().path("true").build()?; let hook = HookBuilder::default().path("true").build()?;
let hooks = Some(vec![hook]); let hooks = Some(vec![hook]);
run_hooks(hooks.as_ref(), Some(&default_container)).context("Failed true")?; run_hooks(hooks.as_ref(), Some(&default_container), None).context("Failed true")?;
} }
{ {
@ -194,7 +203,27 @@ mod test {
.env(vec![String::from("key=value")]) .env(vec![String::from("key=value")])
.build()?; .build()?;
let hooks = Some(vec![hook]); let hooks = Some(vec![hook]);
run_hooks(hooks.as_ref(), Some(&default_container)).context("Failed printenv test")?; run_hooks(hooks.as_ref(), Some(&default_container), None)
.context("Failed printenv test")?;
}
{
assert!(is_command_in_path("pwd"), "The pwd was not found.");
let tmp = tempfile::tempdir()?;
let default_container: Container = Default::default();
let hook = HookBuilder::default()
.path("bash")
.args(vec![
String::from("bash"),
String::from("-c"),
format!("test $(pwd) = {:?}", tmp.path()),
])
.build()?;
let hooks = Some(vec![hook]);
run_hooks(hooks.as_ref(), Some(&default_container), Some(tmp.path()))
.context("Failed pwd test")?;
} }
Ok(()) Ok(())
@ -217,7 +246,7 @@ mod test {
.timeout(1) .timeout(1)
.build()?; .build()?;
let hooks = Some(vec![hook]); let hooks = Some(vec![hook]);
match run_hooks(hooks.as_ref(), Some(&default_container)) { match run_hooks(hooks.as_ref(), Some(&default_container), None) {
Ok(_) => { Ok(_) => {
bail!("The test expects the hook to error out with timeout. Should not execute cleanly"); bail!("The test expects the hook to error out with timeout. Should not execute cleanly");
} }

@ -1,32 +1,40 @@
use super::args::{ContainerArgs, ContainerType}; use std::{
use crate::error::MissingSpecError; collections::HashMap,
use crate::namespaces::NamespaceError; env, fs, mem,
use crate::syscall::{Syscall, SyscallError}; os::unix::io::AsRawFd,
use crate::{apparmor, notify_socket, rootfs, workload}; path::{Path, PathBuf},
use crate::{
capabilities, hooks, namespaces::Namespaces, process::channel, rootfs::RootFS, tty,
user_ns::UserNamespaceConfig, utils,
}; };
use super::args::{ContainerArgs, ContainerType};
#[cfg(feature = "libseccomp")]
use crate::seccomp;
use crate::{
apparmor, capabilities,
error::MissingSpecError,
hooks,
namespaces::{NamespaceError, Namespaces},
notify_socket,
process::channel,
rootfs,
rootfs::RootFS,
syscall::{Syscall, SyscallError},
tty,
user_ns::UserNamespaceConfig,
utils, workload,
};
use nc; use nc;
use nix::mount::MsFlags; use nix::{
use nix::sched::CloneFlags; mount::MsFlags,
use nix::sys::stat::Mode; sched::CloneFlags,
use nix::unistd::setsid; sys::stat::Mode,
use nix::unistd::{self, Gid, Uid}; unistd::setsid,
unistd::{self, Gid, Uid},
};
use oci_spec::runtime::{ use oci_spec::runtime::{
IOPriorityClass, LinuxIOPriority, LinuxNamespaceType, LinuxSchedulerFlag, LinuxSchedulerPolicy, IOPriorityClass, LinuxIOPriority, LinuxNamespaceType, LinuxSchedulerFlag, LinuxSchedulerPolicy,
Scheduler, Spec, User, Scheduler, Spec, User,
}; };
use std::collections::HashMap;
use std::mem;
use std::os::unix::io::AsRawFd;
use std::{
env, fs,
path::{Path, PathBuf},
};
#[cfg(feature = "libseccomp")]
use crate::seccomp;
#[derive(Debug, thiserror::Error)] #[derive(Debug, thiserror::Error)]
pub enum InitProcessError { pub enum InitProcessError {
@ -317,10 +325,12 @@ pub fn container_init_process(
// create_container hook needs to be called after the namespace setup, but // create_container hook needs to be called after the namespace setup, but
// before pivot_root is called. This runs in the container namespaces. // before pivot_root is called. This runs in the container namespaces.
if let Some(hooks) = hooks { if let Some(hooks) = hooks {
hooks::run_hooks(hooks.create_container().as_ref(), container).map_err(|err| { hooks::run_hooks(hooks.create_container().as_ref(), container, None).map_err(
|err| {
tracing::error!(?err, "failed to run create container hooks"); tracing::error!(?err, "failed to run create container hooks");
InitProcessError::Hooks(err) InitProcessError::Hooks(err)
})?; },
)?;
} }
let in_user_ns = utils::is_in_new_userns().map_err(InitProcessError::Io)?; let in_user_ns = utils::is_in_new_userns().map_err(InitProcessError::Io)?;
@ -628,7 +638,7 @@ pub fn container_init_process(
// before pivot_root is called. This runs in the container namespaces. // before pivot_root is called. This runs in the container namespaces.
if matches!(args.container_type, ContainerType::InitContainer) { if matches!(args.container_type, ContainerType::InitContainer) {
if let Some(hooks) = hooks { if let Some(hooks) = hooks {
hooks::run_hooks(hooks.start_container().as_ref(), container).map_err(|err| { hooks::run_hooks(hooks.start_container().as_ref(), container, None).map_err(|err| {
tracing::error!(?err, "failed to run start container hooks"); tracing::error!(?err, "failed to run start container hooks");
err err
})?; })?;

@ -93,7 +93,7 @@ pub fn setup_console_socket(
); );
let csocketfd = match socket::connect( let csocketfd = match socket::connect(
csocketfd.as_raw_fd(), csocketfd.as_raw_fd(),
&socket::UnixAddr::new(socket_name).map_err(|err| TTYError::InvalidSocketName { &socket::UnixAddr::new(linked.as_path()).map_err(|err| TTYError::InvalidSocketName {
source: err, source: err,
socket_name: socket_name.to_string(), socket_name: socket_name.to_string(),
})?, })?,
@ -165,84 +165,72 @@ fn connect_stdio(stdin: &RawFd, stdout: &RawFd, stderr: &RawFd) -> Result<()> {
mod tests { mod tests {
use super::*; use super::*;
use anyhow::Result; use anyhow::{Ok, Result};
use serial_test::serial; use serial_test::serial;
use std::env; use std::fs::File;
use std::fs::{self, File};
use std::os::unix::net::UnixListener; use std::os::unix::net::UnixListener;
use std::path::PathBuf;
const CONSOLE_SOCKET: &str = "console-socket"; const CONSOLE_SOCKET: &str = "console-socket";
fn setup() -> Result<(tempfile::TempDir, PathBuf, PathBuf)> { #[test]
#[serial]
fn test_setup_console_socket() -> Result<()> {
let testdir = tempfile::tempdir()?; let testdir = tempfile::tempdir()?;
let rundir_path = Path::join(testdir.path(), "run"); let socket_path = Path::join(testdir.path(), "test-socket");
fs::create_dir(&rundir_path)?; let lis = UnixListener::bind(&socket_path);
let socket_path = Path::new(&rundir_path).join("socket");
let _ = File::create(&socket_path);
env::set_current_dir(&testdir)?;
Ok((testdir, rundir_path, socket_path))
}
#[test]
#[serial]
fn test_setup_console_socket() {
let init = setup();
assert!(init.is_ok());
let (testdir, rundir_path, socket_path) = init.unwrap();
let lis = UnixListener::bind(Path::join(testdir.path(), "console-socket"));
assert!(lis.is_ok()); assert!(lis.is_ok());
let fd = setup_console_socket(&rundir_path, &socket_path, CONSOLE_SOCKET); let fd = setup_console_socket(testdir.path(), &socket_path, CONSOLE_SOCKET)?;
assert!(fd.is_ok()); assert_ne!(fd.as_raw_fd(), -1);
assert_ne!(fd.unwrap().as_raw_fd(), -1); Ok(())
} }
#[test] #[test]
#[serial] #[serial]
fn test_setup_console_socket_empty() { fn test_setup_console_socket_empty() -> Result<()> {
let init = setup(); let testdir = tempfile::tempdir()?;
assert!(init.is_ok()); let socket_path = Path::join(testdir.path(), "test-socket");
let (_testdir, rundir_path, socket_path) = init.unwrap(); let fd = setup_console_socket(testdir.path(), &socket_path, CONSOLE_SOCKET)?;
let fd = setup_console_socket(&rundir_path, &socket_path, CONSOLE_SOCKET); assert_eq!(fd.as_raw_fd(), -1);
assert!(fd.is_ok()); Ok(())
assert_eq!(fd.unwrap().as_raw_fd(), -1);
} }
#[test] #[test]
#[serial] #[serial]
fn test_setup_console_socket_invalid() { fn test_setup_console_socket_invalid() -> Result<()> {
let init = setup(); let testdir = tempfile::tempdir()?;
assert!(init.is_ok()); let socket_path = Path::join(testdir.path(), "test-socket");
let (testdir, rundir_path, socket_path) = init.unwrap();
let _socket = File::create(Path::join(testdir.path(), "console-socket")); let _socket = File::create(Path::join(testdir.path(), "console-socket"));
assert!(_socket.is_ok()); assert!(_socket.is_ok());
let fd = setup_console_socket(&rundir_path, &socket_path, CONSOLE_SOCKET); let fd = setup_console_socket(testdir.path(), &socket_path, CONSOLE_SOCKET);
assert!(fd.is_err()); assert!(fd.is_err());
Ok(())
} }
#[test] #[test]
#[serial] #[serial]
fn test_setup_console() { fn test_setup_console() -> Result<()> {
let init = setup(); let testdir = tempfile::tempdir()?;
let socket_path = Path::join(testdir.path(), "test-socket");
// duplicate the existing std* fds // duplicate the existing std* fds
// we need to restore them later, and we cannot simply store them // we need to restore them later, and we cannot simply store them
// as they themselves get modified in setup_console // as they themselves get modified in setup_console
let old_stdin: RawFd = nix::unistd::dup(StdIO::Stdin.into()).unwrap(); let old_stdin: RawFd = nix::unistd::dup(StdIO::Stdin.into())?;
let old_stdout: RawFd = nix::unistd::dup(StdIO::Stdout.into()).unwrap(); let old_stdout: RawFd = nix::unistd::dup(StdIO::Stdout.into())?;
let old_stderr: RawFd = nix::unistd::dup(StdIO::Stderr.into()).unwrap(); let old_stderr: RawFd = nix::unistd::dup(StdIO::Stderr.into())?;
assert!(init.is_ok()); let lis = UnixListener::bind(&socket_path);
let (testdir, rundir_path, socket_path) = init.unwrap();
let lis = UnixListener::bind(Path::join(testdir.path(), "console-socket"));
assert!(lis.is_ok()); assert!(lis.is_ok());
let fd = setup_console_socket(&rundir_path, &socket_path, CONSOLE_SOCKET); let fd = setup_console_socket(testdir.path(), &socket_path, CONSOLE_SOCKET);
let status = setup_console(&fd.unwrap()); let status = setup_console(&fd.unwrap());
// restore the original std* before doing final assert // restore the original std* before doing final assert
dup2(old_stdin, StdIO::Stdin.into()).unwrap(); dup2(old_stdin, StdIO::Stdin.into())?;
dup2(old_stdout, StdIO::Stdout.into()).unwrap(); dup2(old_stdout, StdIO::Stdout.into())?;
dup2(old_stderr, StdIO::Stderr.into()).unwrap(); dup2(old_stderr, StdIO::Stderr.into())?;
assert!(status.is_ok()); assert!(status.is_ok());
Ok(())
} }
} }

@ -74,6 +74,10 @@ containerd-test: youki-dev
VAGRANT_VAGRANTFILE=Vagrantfile.containerd2youki vagrant up VAGRANT_VAGRANTFILE=Vagrantfile.containerd2youki vagrant up
VAGRANT_VAGRANTFILE=Vagrantfile.containerd2youki vagrant provision --provision-with test VAGRANT_VAGRANTFILE=Vagrantfile.containerd2youki vagrant provision --provision-with test
# run containerd integration tests
clean-containerd-test:
VAGRANT_VAGRANTFILE=Vagrantfile.containerd2youki vagrant destroy
[private] [private]
kind-cluster: bin-kind kind-cluster: bin-kind
#!/usr/bin/env bash #!/usr/bin/env bash