Files
NetAlertX/test/docker_tests/test_puid_pgid.py
2026-01-09 01:34:31 +00:00

393 lines
14 KiB
Python

"""PUID/PGID runtime user support tests.
These tests exercise the root-priming entrypoint (/root-entrypoint.sh).
They run in NETALERTX_CHECK_ONLY mode to avoid starting long-running services.
"""
from __future__ import annotations
import base64
import os
import subprocess
import uuid
import pytest
IMAGE = os.environ.get("NETALERTX_TEST_IMAGE", "netalertx-test")
pytestmark = [pytest.mark.docker]
def _run_root_entrypoint(
*,
env: dict[str, str] | None = None,
volumes: list[str] | None = None,
extra_args: list[str] | None = None,
add_chown_cap: bool = True,
user: str | None = None,
) -> subprocess.CompletedProcess[str]:
name = f"netalertx-test-puidpgid-{uuid.uuid4().hex[:8]}".lower()
env_vars = dict(env or {})
processed_volumes: list[str] = []
proc_mounts_b64: str | None = None
if volumes:
for volume in volumes:
parts = volume.split(":")
if len(parts) >= 2 and os.path.normpath(parts[1]) == "/proc/mounts":
source_path = parts[0]
try:
with open(source_path, "rb") as fh:
proc_mounts_b64 = base64.b64encode(fh.read()).decode("ascii")
except OSError as exc:
raise RuntimeError(f"Failed to read mock /proc/mounts source: {source_path}") from exc
continue
else:
processed_volumes.append(volume)
if proc_mounts_b64 and "NETALERTX_PROC_MOUNTS_B64" not in env_vars:
env_vars["NETALERTX_PROC_MOUNTS_B64"] = proc_mounts_b64
cmd = [
"docker",
"run",
"--rm",
"--cap-drop",
"ALL",
"--name",
name,
"--network",
"host",
]
if add_chown_cap:
cmd.extend(["--cap-add", "CHOWN"])
cmd.extend([
"--cap-add",
"NET_RAW",
"--cap-add",
"NET_ADMIN",
"--cap-add",
"NET_BIND_SERVICE",
"--cap-add",
"SETUID",
"--cap-add",
"SETGID",
"--tmpfs",
"/tmp:mode=777",
"-e",
"NETALERTX_CHECK_ONLY=1",
])
if extra_args:
cmd.extend(extra_args)
if user:
cmd.extend(["--user", user])
if processed_volumes:
for volume in processed_volumes:
cmd.extend(["-v", volume])
if env_vars:
for key, value in env_vars.items():
cmd.extend(["-e", f"{key}={value}"])
cmd.extend(["--entrypoint", "/root-entrypoint.sh"])
cmd.append(IMAGE)
result = subprocess.run(cmd, capture_output=True, text=True, timeout=60, check=False)
print(result.stdout) # DO NOT REMOVE OR MODIFY - MANDATORY LOGGING FOR DEBUGGING & CI.
print(result.stderr) # DO NOT REMOVE OR MODIFY - MANDATORY LOGGING FOR DEBUGGING & CI.
return result
@pytest.mark.feature_complete
def test_default_puid_pgid_ok() -> None:
result = _run_root_entrypoint(env={"SKIP_TESTS": "1"})
assert result.returncode == 0, result.stderr
@pytest.mark.feature_complete
@pytest.mark.parametrize(
("env", "expected"),
[
({"PUID": "0;rm -rf /", "PGID": "1000"}, "invalid characters"),
({"PUID": "$(id)", "PGID": "1000"}, "invalid characters"),
({"PUID": "-1", "PGID": "1000"}, "invalid characters"),
],
)
def test_invalid_puid_pgid_rejected(env: dict[str, str], expected: str) -> None:
env = {**env}
env.pop("SKIP_TESTS", None)
result = _run_root_entrypoint(env=env)
combined = (result.stdout or "") + (result.stderr or "")
assert result.returncode != 0
if expected == "invalid characters":
assert any(token in combined for token in ("invalid characters", "invalid", "non-numeric")), (
f"Expected an invalid-puid message variant in output, got: {combined}"
)
else:
assert expected in combined
@pytest.mark.feature_complete
def test_legacy_user_mode_skips_puid_pgid() -> None:
result = _run_root_entrypoint(
env={"PUID": "1000", "PGID": "1000"},
user="20211:20211",
)
combined = (result.stdout or "") + (result.stderr or "")
assert result.returncode == 0
# Accept flexible phrasing but ensure intent is present
assert (
("PUID/PGID" in combined and "will not be applied" in combined) or ("continuing as current user" in combined.lower())
)
@pytest.mark.feature_complete
def test_synology_like_fresh_volume_is_primed() -> None:
"""Simulate a fresh named volume that is root-owned and missing copy-up content."""
volume = f"nax_test_data_{uuid.uuid4().hex[:8]}".lower()
try:
result = subprocess.run(["docker", "volume", "create", volume], check=True, capture_output=True, text=True, timeout=15)
print(result.stdout) # DO NOT REMOVE OR MODIFY - MANDATORY LOGGING FOR DEBUGGING & CI.
print(result.stderr) # DO NOT REMOVE OR MODIFY - MANDATORY LOGGING FOR DEBUGGING & CI.
# Seed volume with root-owned dirs/files similar to Synology behavior.
seed_cmd = (
"mkdir -p /data/config /data/db && "
"touch /data/config/app.conf /data/db/app.db && "
"chown -R 0:0 /data && chmod -R 0755 /data && "
"chmod 0644 /data/config/app.conf /data/db/app.db"
)
result = subprocess.run(
[
"docker",
"run",
"--rm",
"--userns",
"host",
"--user",
"0:0",
"-v",
f"{volume}:/data",
"--entrypoint",
"/bin/sh",
"alpine:3.22",
"-c",
seed_cmd,
],
check=True,
capture_output=True,
text=True,
timeout=30,
)
print(result.stdout) # DO NOT REMOVE OR MODIFY - MANDATORY LOGGING FOR DEBUGGING & CI.
print(result.stderr) # DO NOT REMOVE OR MODIFY - MANDATORY LOGGING FOR DEBUGGING & CI.
# Run NetAlertX in priming mode targeting 1000:1000.
result = _run_root_entrypoint(
env={"PUID": "1000", "PGID": "1000", "SKIP_TESTS": "1"},
volumes=[f"{volume}:/data"],
)
assert result.returncode == 0, (result.stdout + result.stderr)
# Verify volume ownership flipped.
stat_cmd = "stat -c '%u:%g' /data /data/config /data/db"
stat_proc = subprocess.run(
[
"docker",
"run",
"--rm",
"--userns",
"host",
"--user",
"0:0",
"-v",
f"{volume}:/data",
"--entrypoint",
"/bin/sh",
"alpine:3.22",
"-c",
stat_cmd,
],
check=True,
capture_output=True,
text=True,
timeout=30,
)
print(stat_proc.stdout) # DO NOT REMOVE OR MODIFY - MANDATORY LOGGING FOR DEBUGGING & CI.
print(stat_proc.stderr) # DO NOT REMOVE OR MODIFY - MANDATORY LOGGING FOR DEBUGGING & CI.
lines = [line.strip() for line in (stat_proc.stdout or "").splitlines() if line.strip()]
assert lines and all(line == "1000:1000" for line in lines), lines
finally:
result = subprocess.run(["docker", "volume", "rm", "-f", volume], check=False, capture_output=True, text=True, timeout=15)
print(result.stdout) # DO NOT REMOVE OR MODIFY - MANDATORY LOGGING FOR DEBUGGING & CI.
print(result.stderr) # DO NOT REMOVE OR MODIFY - MANDATORY LOGGING FOR DEBUGGING & CI.
@pytest.mark.feature_complete
def test_aufs_explicit_root_no_warning() -> None:
"""Verify that explicitly setting PUID=0 on AUFS doesn't trigger the non-root warning."""
volume = f"nax_test_data_aufs_root_{uuid.uuid4().hex[:8]}".lower()
try:
subprocess.run(["docker", "volume", "create", volume], check=True, capture_output=True, text=True, timeout=15)
# Mock AUFS environment
mock_mounts_content = "none / aufs rw,relatime 0 0\n"
mock_file_path = f"/tmp/mock_mounts_{uuid.uuid4().hex[:8]}"
with open(mock_file_path, "w") as f:
f.write(mock_mounts_content)
try:
# Run with explicit PUID=0 - should not warn about non-root
result = _run_root_entrypoint(
env={"PUID": "0", "PGID": "0", "SKIP_TESTS": "1"},
volumes=[f"{volume}:/data", f"{mock_file_path}:/proc/mounts:ro"],
)
combined = (result.stdout or "") + (result.stderr or "")
assert result.returncode == 0, f"Container should start: {combined}"
assert "Running as root (PUID=0)" in combined, f"Should confirm running as root: {combined}"
# Should NOT have the AUFS reduced functionality warning when running as root
assert "Reduced functionality (AUFS + non-root user)" not in combined, f"Should not warn when explicitly using root: {combined}"
finally:
# Clean up mock file
if os.path.exists(mock_file_path):
os.unlink(mock_file_path)
finally:
subprocess.run(["docker", "volume", "rm", "-f", volume], check=False, capture_output=True, text=True, timeout=15)
@pytest.mark.feature_complete
def test_aufs_non_root_warns() -> None:
"""Verify that AUFS hosts warn when running as a non-root PUID."""
volume = f"nax_test_data_aufs_warn_{uuid.uuid4().hex[:8]}".lower()
try:
subprocess.run(["docker", "volume", "create", volume], check=True, capture_output=True, text=True, timeout=15)
mock_mounts_content = "none / aufs rw,relatime 0 0\n"
mock_file_path = f"/tmp/mock_mounts_{uuid.uuid4().hex[:8]}"
with open(mock_file_path, "w") as f:
f.write(mock_mounts_content)
try:
result = _run_root_entrypoint(
env={"PUID": "20211", "PGID": "20211"},
volumes=[f"{volume}:/data", f"{mock_file_path}:/proc/mounts:ro"],
)
combined = (result.stdout or "") + (result.stderr or "")
assert result.returncode == 0, f"Container should continue with warnings: {combined}"
assert "Reduced functionality (AUFS + non-root user)" in combined, f"AUFS warning missing: {combined}"
assert "aufs-capabilities" in combined, "Warning should link to troubleshooting guide"
finally:
if os.path.exists(mock_file_path):
os.unlink(mock_file_path)
finally:
subprocess.run(["docker", "volume", "rm", "-f", volume], check=False, capture_output=True, text=True, timeout=15)
@pytest.mark.feature_complete
def test_non_aufs_defaults_to_20211() -> None:
"""Verify that non-AUFS storage drivers default to PUID=20211."""
volume = f"nax_test_data_nonaufs_{uuid.uuid4().hex[:8]}".lower()
try:
subprocess.run(["docker", "volume", "create", volume], check=True, capture_output=True, text=True, timeout=15)
# Run with NO PUID set and normal storage driver - should default to 20211
result = _run_root_entrypoint(
env={"SKIP_TESTS": "1"},
volumes=[f"{volume}:/data"],
)
combined = (result.stdout or "") + (result.stderr or "")
assert result.returncode == 0, f"Container should start: {combined}"
# Should NOT mention AUFS
assert "AUFS" not in combined and "aufs" not in combined, f"Should not detect AUFS: {combined}"
# Should not auto-default to root
assert "Auto-defaulting to PUID=0" not in combined, f"Should not auto-default to root: {combined}"
finally:
subprocess.run(["docker", "volume", "rm", "-f", volume], check=False, capture_output=True, text=True, timeout=15)
@pytest.mark.feature_complete
def test_missing_cap_chown_fails_priming() -> None:
"""Verify that priming fails when CAP_CHOWN is missing and ownership change is needed."""
volume = f"nax_test_data_nochown_{uuid.uuid4().hex[:8]}".lower()
try:
result = subprocess.run(["docker", "volume", "create", volume], check=True, capture_output=True, text=True, timeout=15)
print(result.stdout) # DO NOT REMOVE OR MODIFY - MANDATORY LOGGING FOR DEBUGGING & CI.
print(result.stderr) # DO NOT REMOVE OR MODIFY - MANDATORY LOGGING FOR DEBUGGING & CI.
# Seed volume with UID 1000 ownership (simulating existing data or host mount)
seed_cmd = (
"mkdir -p /data/config /data/db && "
"touch /data/config/app.conf /data/db/app.db && "
"chown -R 1000:1000 /data && chmod -R 0755 /data"
)
result = subprocess.run(
[
"docker",
"run",
"--rm",
"--userns",
"host",
"--user",
"0:0",
"-v",
f"{volume}:/data",
"--entrypoint",
"/bin/sh",
"alpine:3.22",
"-c",
seed_cmd,
],
check=True,
capture_output=True,
text=True,
timeout=30,
)
print(result.stdout) # DO NOT REMOVE OR MODIFY - MANDATORY LOGGING FOR DEBUGGING & CI.
print(result.stderr) # DO NOT REMOVE OR MODIFY - MANDATORY LOGGING FOR DEBUGGING & CI.
# Run NetAlertX with PUID 20212 (default) but WITHOUT CAP_CHOWN.
# It should warn but continue running.
result = _run_root_entrypoint(
env={"PUID": "20212", "PGID": "20212", "SKIP_TESTS": "1"},
volumes=[f"{volume}:/data"],
add_chown_cap=False,
)
combined = (result.stdout or "") + (result.stderr or "")
assert result.returncode == 0, "Container should continue with warnings when CAP_CHOWN is absent"
assert (
"chown" in combined.lower() or "permission denied" in combined.lower() or "failed to chown" in combined.lower()
)
assert (
"missing-capabilities" in combined or "docs/docker-troubleshooting/missing-capabilities.md" in combined or "permission denied" in combined.lower()
)
finally:
result = subprocess.run(["docker", "volume", "rm", "-f", volume], check=False, capture_output=True, text=True, timeout=15)
print(result.stdout) # DO NOT REMOVE OR MODIFY - MANDATORY LOGGING FOR DEBUGGING & CI.
print(result.stderr) # DO NOT REMOVE OR MODIFY - MANDATORY LOGGING FOR DEBUGGING & CI.