3 TEST_DESCRIPTION
="systemd-nspawn smoke test"
6 .
$TEST_BASE_DIR/test-functions
9 create_empty_image_rootdir
11 # Create what will eventually be our root filesystem onto an overlay
14 eval $
(udevadm info
--export --query=env
--name=${LOOPDEV}p2
)
16 setup_basic_environment
17 dracut_install busybox
chmod rmdir unshare ip sysctl
19 # mask some services that we do not want to run in these tests
20 ln -fs /dev
/null
$initdir/etc
/systemd
/system
/systemd-hwdb-update.service
21 ln -fs /dev
/null
$initdir/etc
/systemd
/system
/systemd-journal-catalog-update.service
22 ln -fs /dev
/null
$initdir/etc
/systemd
/system
/systemd-networkd.service
23 ln -fs /dev
/null
$initdir/etc
/systemd
/system
/systemd-networkd.socket
24 ln -fs /dev
/null
$initdir/etc
/systemd
/system
/systemd-resolved.service
25 ln -fs /dev
/null
$initdir/etc
/systemd
/system
/systemd-machined.service
27 cp create-busybox-container
$initdir/
29 .
/create-busybox-container
$initdir/nc-container
30 initdir
="$initdir/nc-container" dracut_install nc ip
32 # setup the testsuite service
33 cat >$initdir/etc
/systemd
/system
/testsuite.service
<<EOF
35 Description=Testsuite service
38 ExecStart=/test-nspawn.sh
44 cat >$initdir/test-nspawn.sh
<<'EOF'
51 export SYSTEMD_LOG_LEVEL=debug
56 if mount -t cgroup2 cgroup2 /tmp/cgroup2; then
62 # check cgroup namespaces
64 if [[ -f /proc/1/ns/cgroup ]]; then
68 is_user_ns_supported=no
69 # On some systems (e.g. CentOS 7) the default limit for user namespaces
70 # is set to 0, which causes the following unshare syscall to fail, even
71 # with enabled user namespaces support. By setting this value explicitly
72 # we can ensure the user namespaces support to be detected correctly.
73 sysctl -w user.max_user_namespaces=10000
74 if unshare -U sh -c :; then
75 is_user_ns_supported=yes
78 function check_bind_tmp_path {
79 # https://github.com/systemd/systemd/issues/4789
80 local _root="/var/lib/machines/bind-tmp-path"
81 /create-busybox-container "$_root"
83 systemd-nspawn --register=no -D "$_root" --bind=/tmp/bind /bin/sh -c 'test -e /tmp/bind'
86 function check_notification_socket {
87 # https://github.com/systemd/systemd/issues/4944
88 local _cmd='echo a | $(busybox which nc) -U -u -w 1 /run/systemd/nspawn/notify'
89 systemd-nspawn --register=no -D /nc-container /bin/sh -x -c "$_cmd"
90 systemd-nspawn --register=no -D /nc-container -U /bin/sh -x -c "$_cmd"
94 if [[ "$1" = "yes" && "$is_v2_supported" = "no" ]]; then
95 printf "Unified cgroup hierarchy is not supported. Skipping.\n" >&2
98 if [[ "$2" = "yes" && "$is_cgns_supported" = "no" ]]; then
99 printf "CGroup namespaces are not supported. Skipping.\n" >&2
103 local _root="/var/lib/machines/unified-$1-cgns-$2-api-vfs-writable-$3"
104 /create-busybox-container "$_root"
105 UNIFIED_CGROUP_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn --register=no -D "$_root" -b
106 UNIFIED_CGROUP_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn --register=no -D "$_root" --private-network -b
108 if UNIFIED_CGROUP_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn --register=no -D "$_root" -U -b; then
109 [[ "$is_user_ns_supported" = "yes" && "$3" = "network" ]] && return 1
111 [[ "$is_user_ns_supported" = "no" && "$3" = "network" ]] && return 1
114 if UNIFIED_CGROUP_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn --register=no -D "$_root" --private-network -U -b; then
115 [[ "$is_user_ns_supported" = "yes" && "$3" = "yes" ]] && return 1
117 [[ "$is_user_ns_supported" = "no" && "$3" = "yes" ]] && return 1
120 local _netns_opt="--network-namespace-path=/proc/self/ns/net"
122 # --network-namespace-path and network-related options cannot be used together
123 if UNIFIED_CGROUP_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn --register=no -D "$_root" "$_netns_opt" --network-interface=lo -b; then
127 if UNIFIED_CGROUP_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn --register=no -D "$_root" "$_netns_opt" --network-macvlan=lo -b; then
131 if UNIFIED_CGROUP_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn --register=no -D "$_root" "$_netns_opt" --network-ipvlan=lo -b; then
135 if UNIFIED_CGROUP_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn --register=no -D "$_root" "$_netns_opt" --network-veth -b; then
139 if UNIFIED_CGROUP_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn --register=no -D "$_root" "$_netns_opt" --network-veth-extra=lo -b; then
143 if UNIFIED_CGROUP_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn --register=no -D "$_root" "$_netns_opt" --network-bridge=lo -b; then
147 if UNIFIED_CGROUP_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn --register=no -D "$_root" "$_netns_opt" --network-zone=zone -b; then
151 if UNIFIED_CGROUP_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn --register=no -D "$_root" "$_netns_opt" --private-network -b; then
155 # test --network-namespace-path works with a network namespace created by "ip netns"
156 ip netns add nspawn_test
157 _netns_opt="--network-namespace-path=/run/netns/nspawn_test"
158 UNIFIED_CGROUP_HIERARCHY="$1" SYSTEMD_NSPAWN_USE_CGNS="$2" SYSTEMD_NSPAWN_API_VFS_WRITABLE="$3" systemd-nspawn --register=no -D "$_root" "$_netns_opt" /bin/ip a | grep -v -E '^1: lo.*UP'
160 ip netns del nspawn_test
162 if [ $r -ne 0 ]; then
171 check_notification_socket
173 for api_vfs_writable in yes no network; do
174 run no no $api_vfs_writable
175 run yes no $api_vfs_writable
176 run no yes $api_vfs_writable
177 run yes yes $api_vfs_writable
183 chmod 0755 $initdir/test-nspawn.sh