forked from coreos/coreos-assembler
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathcore.go
445 lines (402 loc) · 12.7 KB
/
core.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
package coretest
import (
"bytes"
"encoding/json"
"fmt"
"os/exec"
"strconv"
"strings"
"time"
"github.com/pborman/uuid"
"github.com/coreos/coreos-assembler/mantle/kola"
"github.com/coreos/coreos-assembler/mantle/kola/cluster"
"github.com/coreos/coreos-assembler/mantle/kola/register"
"github.com/coreos/coreos-assembler/mantle/platform"
"github.com/coreos/coreos-assembler/mantle/platform/machine/qemu"
"github.com/coreos/coreos-assembler/mantle/util"
)
const (
DockerTimeout = time.Second * 60
PortTimeout = time.Second * 3
uefi = "uefi"
uefiSecure = "uefi-secure"
bios = "bios"
)
// RHCOS services we expect disabled/inactive
var offServices = []string{
"dnsmasq.service",
"nfs-blkmap.service",
"nfs-idmapd.service",
"nfs-mountd.service",
"nfs-server.service",
"nis-domainname.service",
"rbdmap.service",
"rdisc.service",
"rpc-statd.service",
"rpcbind.service",
"rpcbind.socket",
"tcsd.service",
}
var nativeFuncs = map[string]register.NativeFuncWrap{
"PortSSH": register.CreateNativeFuncWrap(TestPortSsh),
"DbusPerms": register.CreateNativeFuncWrap(TestDbusPerms),
"ServicesActive": register.CreateNativeFuncWrap(TestServicesActive),
"ReadOnly": register.CreateNativeFuncWrap(TestReadOnlyFs),
"Useradd": register.CreateNativeFuncWrap(TestUseradd),
"MachineID": register.CreateNativeFuncWrap(TestMachineID),
"RHCOSGrowpart": register.CreateNativeFuncWrap(TestRHCOSGrowfs, []string{"fcos"}...),
"FCOSGrowpart": register.CreateNativeFuncWrap(TestFCOSGrowfs, []string{"rhcos"}...),
}
func init() {
register.RegisterTest(®ister.Test{
Name: "basic",
Description: "Verify basic functionalities like SSH, systemd services, useradd, etc.",
Run: LocalTests,
ClusterSize: 1,
NativeFuncs: nativeFuncs,
})
register.RegisterTest(®ister.Test{
Name: "basic.uefi",
Description: "Verify basic functionalities like SSH, systemd services, useradd, etc, with UEFI enabled",
Run: uefiWithBasicTests,
Platforms: []string{"qemu"},
ClusterSize: 0,
NativeFuncs: nativeFuncs,
})
register.RegisterTest(®ister.Test{
Name: "basic.uefi-secure",
Description: "Verify basic functionalities like SSH, systemd services, useradd, etc, with UEFI Secure Boot enabled",
Run: uefiSecureWithBasicTests,
Platforms: []string{"qemu"},
ClusterSize: 0,
NativeFuncs: nativeFuncs,
})
register.RegisterTest(®ister.Test{
Name: "basic.nvme",
Description: "Verify basic functionalities like SSH, systemd services, useradd, etc, with nvme enabled",
Run: nvmeBasicTests,
Platforms: []string{"qemu"},
ClusterSize: 0,
NativeFuncs: nativeFuncs,
})
// TODO: Enable DockerPing/DockerEcho once fixed
// TODO: Only enable PodmanPing on non qemu. Needs:
// https://github.com/coreos/mantle/issues/1132
register.RegisterTest(®ister.Test{
Name: "fcos.internet",
Description: "Verify that podman echo and get head work.",
Run: InternetTests,
ClusterSize: 1,
Tags: []string{kola.NeedsInternetTag},
NativeFuncs: map[string]register.NativeFuncWrap{
"PodmanEcho": register.CreateNativeFuncWrap(TestPodmanEcho),
"PodmanWgetHead": register.CreateNativeFuncWrap(TestPodmanWgetHead),
},
Distros: []string{"fcos"},
})
register.RegisterTest(®ister.Test{
Name: "rootfs.uuid",
Description: "Verify that the root disk's GUID was set to a random one on first boot.",
Run: LocalTests,
ClusterSize: 1,
NativeFuncs: map[string]register.NativeFuncWrap{
"RandomUUID": register.CreateNativeFuncWrap(TestFsRandomUUID),
},
// FIXME run on RHCOS once it has https://github.com/coreos/ignition-dracut/pull/93
Distros: []string{"fcos"},
})
register.RegisterTest(®ister.Test{
Name: "rhcos.services-disabled",
Description: "Verify the specific services are disabled/inactive",
Run: LocalTests,
ClusterSize: 1,
NativeFuncs: map[string]register.NativeFuncWrap{
"ServicesDisabled": register.CreateNativeFuncWrap(TestServicesDisabledRHCOS),
},
Distros: []string{"rhcos"},
})
}
func uefiWithBasicTests(c cluster.TestCluster) {
runBasicTests(c, uefi, false)
}
func uefiSecureWithBasicTests(c cluster.TestCluster) {
runBasicTests(c, uefiSecure, false)
}
func nvmeBasicTests(c cluster.TestCluster) {
runBasicTests(c, bios, true)
}
func runBasicTests(c cluster.TestCluster, firmware string, nvme bool) {
var err error
var m platform.Machine
options := platform.QemuMachineOptions{
Firmware: firmware,
Nvme: nvme,
}
switch pc := c.Cluster.(type) {
// These cases have to be separated because when put together to the same case statement
// the golang compiler no longer checks that the individual types in the case have the
// NewMachineWithQemuOptions function, but rather whether platform.Cluster
// does which fails
case *qemu.Cluster:
m, err = pc.NewMachineWithQemuOptions(nil, options)
default:
panic("Unsupported cluster type")
}
if err != nil {
c.Fatal(err)
}
// copy over kolet into the machine
if err := kola.ScpKolet([]platform.Machine{m}); err != nil {
c.Fatal(err)
}
LocalTests(c)
}
func TestPortSsh() error {
//t.Parallel()
err := CheckPort("tcp", "127.0.0.1:22", PortTimeout)
if err != nil {
return err
}
return nil
}
func TestDockerEcho() error {
//t.Parallel()
return util.RunCmdTimeout(DockerTimeout, "docker", "run", "busybox", "echo")
}
func TestDockerPing() error {
//t.Parallel()
return util.RunCmdTimeout(DockerTimeout, "docker", "run", "busybox", "ping", "-c4", "coreos.com")
}
func TestPodmanEcho() error {
//t.Parallel()
return util.RunCmdTimeout(DockerTimeout, "podman", "run", "busybox", "echo")
}
func TestPodmanPing() error {
//t.Parallel()
return util.RunCmdTimeout(DockerTimeout, "podman", "run", "busybox", "ping", "-c4", "coreos.com")
}
func TestPodmanWgetHead() error {
//t.Parallel()
return util.RunCmdTimeout(DockerTimeout, "podman", "run", "busybox", "wget", "--spider", "http://fedoraproject.org/static/hotspot.txt")
}
// This execs gdbus, because we need to change uses to test perms.
func TestDbusPerms() error {
c := exec.Command(
"sudo", "-u", "core",
"gdbus", "call", "--system",
"--dest", "org.freedesktop.systemd1",
"--object-path", "/org/freedesktop/systemd1",
"--method", "org.freedesktop.systemd1.Manager.RestartUnit",
"ntpd.service", "replace",
)
out, err := c.CombinedOutput()
if err != nil {
if !strings.Contains(string(out), "org.freedesktop.DBus.Error.AccessDenied") &&
!strings.Contains(string(out), "org.freedesktop.DBus.Error.InteractiveAuthorizationRequired") {
return err
}
} else {
return fmt.Errorf("We were able to call RestartUnit as a non-root user.")
}
c = exec.Command(
"sudo", "-u", "core",
"gdbus", "call", "--system",
"--dest", "org.freedesktop.systemd1",
"--object-path", "/org/freedesktop/systemd1/unit/ntpd_2eservice",
"--method", "org.freedesktop.DBus.Properties.GetAll",
"org.freedesktop.systemd1.Unit",
)
out, err = c.CombinedOutput()
if err != nil {
return fmt.Errorf("Err:%s\n Out:%v", err, out)
}
return nil
}
func TestServicesActive() error {
return servicesActive([]string{
"multi-user.target",
})
}
func servicesActive(units []string) error {
//t.Parallel()
for _, unit := range units {
c := exec.Command("systemctl", "is-active", unit)
err := c.Run()
if err != nil {
return fmt.Errorf("Services Active: %v", err)
}
}
return nil
}
func TestServicesDisabledRHCOS() error {
err := servicesInactive(offServices)
if err != nil {
return err
}
err = servicesDisabled(offServices)
if err != nil {
return err
}
return nil
}
func servicesInactive(units []string) error {
for _, unit := range units {
c := exec.Command("systemctl", "is-active", unit)
err := c.Run()
if err == nil {
return fmt.Errorf("Service Incorrectly Active: %q", unit)
}
}
return nil
}
func servicesDisabled(units []string) error {
for _, unit := range units {
c := exec.Command("systemctl", "is-enabled", unit)
out, err := c.Output()
if err == nil {
// "is-enabled" can return 0 in some cases when the output is not
// explicitly "disabled". In the case of the RHCOS services
// that are checked, we expect some to report "static"
outString := strings.TrimSuffix(string(out), "\n")
if (outString != "disabled") && (outString != "static") {
return fmt.Errorf("Service Incorrectly Enabled: %q", unit)
}
}
}
return nil
}
func TestReadOnlyFs() error {
mountModes := make(map[string]bool)
mounts, err := GetMountTable()
if err != nil {
return err
}
for _, m := range mounts {
mountModes[m.MountPoint] = m.Options[0] == "ro"
}
if mp, ok := mountModes["/usr"]; ok {
if mp {
return nil
} else {
return fmt.Errorf("/usr is not mounted read-only.")
}
} else if mp, ok := mountModes["/"]; ok {
if mp {
return nil
} else {
return fmt.Errorf("/ is not mounted read-only.")
}
}
return fmt.Errorf("could not find /usr or / mount points.")
}
// Test that the root disk's GUID was set to a random one on first boot.
func TestFsRandomUUID() error {
c := exec.Command("sh", "-ec", "sudo blkid -o value -s PTUUID /dev/$(lsblk -no PKNAME $(findmnt -vno SOURCE /))")
out, err := c.Output()
if err != nil {
return fmt.Errorf("findmnt: %v", err)
}
got, err := uuid.ParseBytes(bytes.TrimSpace(out))
if err != nil {
return fmt.Errorf("malformed GUID: %v", err)
}
defaultGUID := uuid.Parse("00000000-0000-4000-a000-000000000001")
if uuid.Equal(defaultGUID, got) {
return fmt.Errorf("unexpected default GUID found")
}
return nil
}
// Test "Add User Manually", from https://coreos.com/os/docs/latest/adding-users.html
func TestUseradd() error {
u := "user1"
c := exec.Command("sudo", "useradd", "-p", "*", "-U", "-m", u, "-G", "sudo")
err := c.Run()
if err != nil {
return fmt.Errorf("useradd: %v", err)
}
// verify
c = exec.Command("id", u)
err = c.Run()
if err != nil {
return fmt.Errorf("id %s: %v", u, err)
}
return nil
}
// Test that /etc/machine-id isn't empty or COREOS_BLANK_MACHINE_ID
func TestMachineID() error {
id := MachineID()
if id == "" {
return fmt.Errorf("machine-id is empty")
} else if id == "COREOS_BLANK_MACHINE_ID" {
return fmt.Errorf("machine-id is %s", id)
}
return nil
}
func testGrowfs(size int) error {
// check that ignition-ostree-growfs.service was run and exited normally
err := checkService("ignition-ostree-growfs.service")
if err != nil {
return err
}
err = checkFilesystemSize(size)
if err != nil {
return err
}
return nil
}
// TestRHCOSGrowfs tests whether ignition-ostree-growfs.service was run
// successfully and check that filesystem size has been grown to at least 15
// GB.
func TestRHCOSGrowfs() error {
// check that filesystem size is >= 15 GB
return testGrowfs(15 * 1024 * 1024 * 1024)
}
// TestFCOSGrowfs tests whether ignition-ostree-growfs.service was run successfully
// and check that filesystem size has been grown to at least 7 GB.
func TestFCOSGrowfs() error {
// check that filesystem size is >= 7 GB
return testGrowfs(7 * 1024 * 1024 * 1024)
}
func checkService(unit string) error {
// Value of MESSAGE_ID= is the SD_MESSAGE_UNIT_STARTED macro's value from
// https://github.com/systemd/systemd/blob/master/src/systemd/sd-messages.h
// For oneshot type services that remain after exit, STARTED being "done"
// should imply that the service ran and exited successfully.
//
// We add `--directory=/var/log/journal` here because we were seeing a race
// condition starting on systemd 254 on s390x/ppc64le where we would get
// two duplicate entries (one each from {/var,/run}log/journal/) returned
// and it would break the json.Unmarshal below.
c := exec.Command("journalctl", "-o", "json", "--directory=/var/log/journal",
"MESSAGE_ID=39f53479d3a045ac8e11786248231fbf", "UNIT="+unit)
out, err := c.Output()
if err != nil {
return fmt.Errorf("journalctl: %s", err)
}
if len(out) == 0 {
return fmt.Errorf("%s did not start", unit)
}
var journalOutput map[string]string
if err := json.Unmarshal(out, &journalOutput); err != nil {
return fmt.Errorf("Error getting journalclt output for %s: %s. Out: %s", unit, err, out)
}
if journalOutput["JOB_RESULT"] != "done" {
return fmt.Errorf("%s did not start successfully\n Journalctl output: %q", unit, out)
}
return nil
}
func checkFilesystemSize(size int) error {
c := exec.Command("bash", "-c", "echo $(($(stat -f /sysroot --format '%S * %b')))")
filesystemSizeStr, err := c.Output()
if err != nil {
return fmt.Errorf("Error getting filesystem size: %s", err)
}
filesystemSize, err := strconv.Atoi(strings.TrimSuffix(string(filesystemSizeStr), "\n"))
if err != nil {
return fmt.Errorf("Error converting filesystem size from string to int: %s", err)
}
if filesystemSize < size {
return fmt.Errorf("Filesystem size is less than %d bytes, size in bytes: %d", size, filesystemSize)
}
return nil
}