134 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			134 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			Go
		
	
	
	
/*
 | 
						|
Copyright 2019 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package e2enode
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"fmt"
 | 
						|
 | 
						|
	v1 "k8s.io/api/core/v1"
 | 
						|
	"k8s.io/apimachinery/pkg/api/resource"
 | 
						|
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						|
	"k8s.io/apimachinery/pkg/util/uuid"
 | 
						|
	admissionapi "k8s.io/pod-security-admission/api"
 | 
						|
 | 
						|
	kubeletconfig "k8s.io/kubernetes/pkg/kubelet/apis/config"
 | 
						|
	"k8s.io/kubernetes/pkg/kubelet/cm"
 | 
						|
	"k8s.io/kubernetes/test/e2e/framework"
 | 
						|
	e2epod "k8s.io/kubernetes/test/e2e/framework/pod"
 | 
						|
	imageutils "k8s.io/kubernetes/test/utils/image"
 | 
						|
 | 
						|
	"github.com/onsi/ginkgo/v2"
 | 
						|
)
 | 
						|
 | 
						|
// makePodToVerifyPids returns a pod that verifies specified cgroup with pids
 | 
						|
func makePodToVerifyPids(baseName string, pidsLimit resource.Quantity) *v1.Pod {
 | 
						|
	// convert the cgroup name to its literal form
 | 
						|
	cgroupFsName := ""
 | 
						|
	cgroupName := cm.NewCgroupName(cm.RootCgroupName, defaultNodeAllocatableCgroup, baseName)
 | 
						|
	if kubeletCfg.CgroupDriver == "systemd" {
 | 
						|
		cgroupFsName = cgroupName.ToSystemd()
 | 
						|
	} else {
 | 
						|
		cgroupFsName = cgroupName.ToCgroupfs()
 | 
						|
	}
 | 
						|
 | 
						|
	// this command takes the expected value and compares it against the actual value for the pod cgroup pids.max
 | 
						|
	command := ""
 | 
						|
	if IsCgroup2UnifiedMode() {
 | 
						|
		command = fmt.Sprintf("expected=%v; actual=$(cat /tmp/%v/pids.max); if [ \"$expected\" -ne \"$actual\" ]; then exit 1; fi; ", pidsLimit.Value(), cgroupFsName)
 | 
						|
	} else {
 | 
						|
		command = fmt.Sprintf("expected=%v; actual=$(cat /tmp/pids/%v/pids.max); if [ \"$expected\" -ne \"$actual\" ]; then exit 1; fi; ", pidsLimit.Value(), cgroupFsName)
 | 
						|
	}
 | 
						|
 | 
						|
	framework.Logf("Pod to run command: %v", command)
 | 
						|
	pod := &v1.Pod{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name: "pod" + string(uuid.NewUUID()),
 | 
						|
		},
 | 
						|
		Spec: v1.PodSpec{
 | 
						|
			RestartPolicy: v1.RestartPolicyNever,
 | 
						|
			Containers: []v1.Container{
 | 
						|
				{
 | 
						|
					Image:   busyboxImage,
 | 
						|
					Name:    "container" + string(uuid.NewUUID()),
 | 
						|
					Command: []string{"sh", "-c", command},
 | 
						|
					VolumeMounts: []v1.VolumeMount{
 | 
						|
						{
 | 
						|
							Name:      "sysfscgroup",
 | 
						|
							MountPath: "/tmp",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Volumes: []v1.Volume{
 | 
						|
				{
 | 
						|
					Name: "sysfscgroup",
 | 
						|
					VolumeSource: v1.VolumeSource{
 | 
						|
						HostPath: &v1.HostPathVolumeSource{Path: "/sys/fs/cgroup"},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	return pod
 | 
						|
}
 | 
						|
 | 
						|
func runPodPidsLimitTests(f *framework.Framework) {
 | 
						|
	ginkgo.It("should set pids.max for Pod", func(ctx context.Context) {
 | 
						|
		ginkgo.By("by creating a G pod")
 | 
						|
		pod := e2epod.NewPodClient(f).CreateSync(ctx, &v1.Pod{
 | 
						|
			ObjectMeta: metav1.ObjectMeta{
 | 
						|
				Name:      "pod" + string(uuid.NewUUID()),
 | 
						|
				Namespace: f.Namespace.Name,
 | 
						|
			},
 | 
						|
			Spec: v1.PodSpec{
 | 
						|
				Containers: []v1.Container{
 | 
						|
					{
 | 
						|
						Image: imageutils.GetPauseImageName(),
 | 
						|
						Name:  "container" + string(uuid.NewUUID()),
 | 
						|
						Resources: v1.ResourceRequirements{
 | 
						|
							Limits: v1.ResourceList{
 | 
						|
								v1.ResourceName("cpu"):    resource.MustParse("10m"),
 | 
						|
								v1.ResourceName("memory"): resource.MustParse("100Mi"),
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		})
 | 
						|
		podUID := string(pod.UID)
 | 
						|
		ginkgo.By("checking if the expected pids settings were applied")
 | 
						|
		verifyPod := makePodToVerifyPids("pod"+podUID, resource.MustParse("1024"))
 | 
						|
		e2epod.NewPodClient(f).Create(ctx, verifyPod)
 | 
						|
		err := e2epod.WaitForPodSuccessInNamespace(ctx, f.ClientSet, verifyPod.Name, f.Namespace.Name)
 | 
						|
		framework.ExpectNoError(err)
 | 
						|
	})
 | 
						|
}
 | 
						|
 | 
						|
// Serial because the test updates kubelet configuration.
 | 
						|
var _ = SIGDescribe("PodPidsLimit", framework.WithSerial(), func() {
 | 
						|
	f := framework.NewDefaultFramework("pids-limit-test")
 | 
						|
	f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
 | 
						|
	ginkgo.Context("With config updated with pids limits", func() {
 | 
						|
		tempSetCurrentKubeletConfig(f, func(ctx context.Context, initialConfig *kubeletconfig.KubeletConfiguration) {
 | 
						|
			initialConfig.PodPidsLimit = int64(1024)
 | 
						|
		})
 | 
						|
		runPodPidsLimitTests(f)
 | 
						|
		addAfterEachForCleaningUpPods(f)
 | 
						|
	})
 | 
						|
})
 |