2016-07-22 21:24:05 +00:00
|
|
|
/*
|
|
|
|
Copyright 2016 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package dockershim
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
|
2016-10-29 00:01:06 +00:00
|
|
|
"github.com/golang/glog"
|
2016-10-25 03:42:20 +00:00
|
|
|
"k8s.io/kubernetes/pkg/apis/componentconfig"
|
2016-08-01 22:13:36 +00:00
|
|
|
internalApi "k8s.io/kubernetes/pkg/kubelet/api"
|
2016-07-22 21:24:05 +00:00
|
|
|
runtimeApi "k8s.io/kubernetes/pkg/kubelet/api/v1alpha1/runtime"
|
|
|
|
kubecontainer "k8s.io/kubernetes/pkg/kubelet/container"
|
2016-10-10 20:56:53 +00:00
|
|
|
"k8s.io/kubernetes/pkg/kubelet/dockershim/cm"
|
2016-07-22 21:24:05 +00:00
|
|
|
"k8s.io/kubernetes/pkg/kubelet/dockertools"
|
2016-10-25 03:42:20 +00:00
|
|
|
"k8s.io/kubernetes/pkg/kubelet/network"
|
|
|
|
"k8s.io/kubernetes/pkg/kubelet/network/cni"
|
|
|
|
"k8s.io/kubernetes/pkg/kubelet/network/kubenet"
|
2016-10-26 23:34:45 +00:00
|
|
|
"k8s.io/kubernetes/pkg/kubelet/server/streaming"
|
2016-09-22 17:36:09 +00:00
|
|
|
"k8s.io/kubernetes/pkg/util/term"
|
2016-07-22 21:24:05 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
dockerRuntimeName = "docker"
|
|
|
|
kubeAPIVersion = "0.1.0"
|
|
|
|
|
|
|
|
// String used to detect docker host mode for various namespaces (e.g.
|
|
|
|
// networking). Must match the value returned by docker inspect -f
|
|
|
|
// '{{.HostConfig.NetworkMode}}'.
|
|
|
|
namespaceModeHost = "host"
|
|
|
|
|
2016-07-25 23:25:36 +00:00
|
|
|
dockerNetNSFmt = "/proc/%v/ns/net"
|
|
|
|
|
2016-07-22 21:24:05 +00:00
|
|
|
defaultSeccompProfile = "unconfined"
|
2016-07-25 23:25:36 +00:00
|
|
|
|
|
|
|
// Internal docker labels used to identify whether a container is a sandbox
|
|
|
|
// or a regular container.
|
|
|
|
// TODO: This is not backward compatible with older containers. We will
|
|
|
|
// need to add filtering based on names.
|
|
|
|
containerTypeLabelKey = "io.kubernetes.docker.type"
|
|
|
|
containerTypeLabelSandbox = "podsandbox"
|
|
|
|
containerTypeLabelContainer = "container"
|
2016-10-14 18:52:18 +00:00
|
|
|
containerLogPathLabelKey = "io.kubernetes.container.logpath"
|
2016-09-16 00:31:51 +00:00
|
|
|
sandboxIDLabelKey = "io.kubernetes.sandbox.id"
|
2016-07-22 21:24:05 +00:00
|
|
|
)
|
|
|
|
|
2016-10-25 03:42:20 +00:00
|
|
|
// NetworkPluginArgs is the subset of kubelet runtime args we pass
|
|
|
|
// to the container runtime shim so it can probe for network plugins.
|
|
|
|
// In the future we will feed these directly to a standalone container
|
|
|
|
// runtime process.
|
|
|
|
type NetworkPluginSettings struct {
|
|
|
|
// HairpinMode is best described by comments surrounding the kubelet arg
|
|
|
|
HairpinMode componentconfig.HairpinMode
|
|
|
|
// NonMasqueradeCIDR is the range of ips which should *not* be included
|
|
|
|
// in any MASQUERADE rules applied by the plugin
|
|
|
|
NonMasqueradeCIDR string
|
|
|
|
// PluginName is the name of the plugin, runtime shim probes for
|
|
|
|
PluginName string
|
|
|
|
// PluginBinDir is the directory in which the binaries for the plugin with
|
|
|
|
// PluginName is kept. The admin is responsible for provisioning these
|
|
|
|
// binaries before-hand.
|
|
|
|
PluginBinDir string
|
|
|
|
// PluginConfDir is the directory in which the admin places a CNI conf.
|
|
|
|
// Depending on the plugin, this may be an optional field, eg: kubenet
|
|
|
|
// generates its own plugin conf.
|
|
|
|
PluginConfDir string
|
|
|
|
// MTU is the desired MTU for network devices created by the plugin.
|
|
|
|
MTU int
|
|
|
|
|
|
|
|
// RuntimeHost is an interface that serves as a trap-door from plugin back
|
|
|
|
// into the kubelet.
|
2016-10-29 00:01:06 +00:00
|
|
|
// TODO: This shouldn't be required, remove once we move host ports into CNI
|
|
|
|
// and figure out bandwidth shaping. See corresponding comments above
|
|
|
|
// network.Host interface.
|
|
|
|
LegacyRuntimeHost network.LegacyHost
|
2016-10-25 03:42:20 +00:00
|
|
|
}
|
|
|
|
|
2016-10-14 18:52:18 +00:00
|
|
|
var internalLabelKeys []string = []string{containerTypeLabelKey, containerLogPathLabelKey, sandboxIDLabelKey}
|
2016-09-16 00:31:51 +00:00
|
|
|
|
2016-09-26 07:46:29 +00:00
|
|
|
// NOTE: Anything passed to DockerService should be eventually handled in another way when we switch to running the shim as a different process.
|
2016-10-10 20:56:53 +00:00
|
|
|
func NewDockerService(client dockertools.DockerInterface, seccompProfileRoot string, podSandboxImage string, streamingConfig *streaming.Config, pluginSettings *NetworkPluginSettings, cgroupsName string) (DockerService, error) {
|
|
|
|
c := dockertools.NewInstrumentedDockerInterface(client)
|
2016-10-26 23:34:45 +00:00
|
|
|
ds := &dockerService{
|
2016-09-26 07:46:29 +00:00
|
|
|
seccompProfileRoot: seccompProfileRoot,
|
2016-10-10 20:56:53 +00:00
|
|
|
client: c,
|
2016-10-14 18:52:18 +00:00
|
|
|
os: kubecontainer.RealOS{},
|
2016-09-26 14:18:06 +00:00
|
|
|
podSandboxImage: podSandboxImage,
|
2016-10-26 23:34:45 +00:00
|
|
|
streamingRuntime: &streamingRuntime{
|
|
|
|
client: client,
|
|
|
|
// Only the native exec handling is supported for now.
|
|
|
|
// TODO(#35747) - Either deprecate nsenter exec handling, or add support for it here.
|
|
|
|
execHandler: &dockertools.NativeExecHandler{},
|
|
|
|
},
|
2016-10-10 20:56:53 +00:00
|
|
|
containerManager: cm.NewContainerManager(cgroupsName, client),
|
2016-07-22 21:24:05 +00:00
|
|
|
}
|
2016-10-26 23:34:45 +00:00
|
|
|
if streamingConfig != nil {
|
|
|
|
var err error
|
|
|
|
ds.streamingServer, err = streaming.NewServer(*streamingConfig, ds.streamingRuntime)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
2016-10-25 03:42:20 +00:00
|
|
|
// dockershim currently only supports CNI plugins.
|
|
|
|
cniPlugins := cni.ProbeNetworkPlugins(pluginSettings.PluginConfDir, pluginSettings.PluginBinDir)
|
|
|
|
cniPlugins = append(cniPlugins, kubenet.NewPlugin(pluginSettings.PluginBinDir))
|
2016-10-29 00:01:06 +00:00
|
|
|
netHost := &dockerNetworkHost{
|
|
|
|
pluginSettings.LegacyRuntimeHost,
|
|
|
|
&namespaceGetter{ds},
|
|
|
|
}
|
|
|
|
plug, err := network.InitNetworkPlugin(cniPlugins, pluginSettings.PluginName, netHost, pluginSettings.HairpinMode, pluginSettings.NonMasqueradeCIDR, pluginSettings.MTU)
|
2016-10-25 03:42:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("didn't find compatible CNI plugin with given settings %+v: %v", pluginSettings, err)
|
|
|
|
}
|
|
|
|
ds.networkPlugin = plug
|
2016-10-29 00:01:06 +00:00
|
|
|
glog.Infof("Docker cri networking managed by %v", plug.Name())
|
2016-10-26 23:34:45 +00:00
|
|
|
return ds, nil
|
2016-07-22 21:24:05 +00:00
|
|
|
}
|
|
|
|
|
2016-10-04 03:49:19 +00:00
|
|
|
// DockerService is an interface that embeds both the new RuntimeService and
|
|
|
|
// ImageService interfaces, while including DockerLegacyService for backward
|
|
|
|
// compatibility.
|
|
|
|
type DockerService interface {
|
2016-08-01 22:13:36 +00:00
|
|
|
internalApi.RuntimeService
|
|
|
|
internalApi.ImageManagerService
|
2016-10-04 03:49:19 +00:00
|
|
|
DockerLegacyService
|
2016-10-10 20:56:53 +00:00
|
|
|
Start() error
|
2016-10-04 03:49:19 +00:00
|
|
|
}
|
2016-07-22 21:24:05 +00:00
|
|
|
|
2016-10-04 03:49:19 +00:00
|
|
|
// DockerLegacyService is an interface that embeds all legacy methods for
|
|
|
|
// backward compatibility.
|
|
|
|
type DockerLegacyService interface {
|
2016-07-22 21:24:05 +00:00
|
|
|
// Supporting legacy methods for docker.
|
2016-10-26 23:34:45 +00:00
|
|
|
LegacyExec(containerID kubecontainer.ContainerID, cmd []string, stdin io.Reader, stdout, stderr io.WriteCloser, tty bool, resize <-chan term.Size) error
|
|
|
|
LegacyAttach(id kubecontainer.ContainerID, stdin io.Reader, stdout, stderr io.WriteCloser, tty bool, resize <-chan term.Size) error
|
|
|
|
LegacyPortForward(sandboxID string, port uint16, stream io.ReadWriteCloser) error
|
2016-07-22 21:24:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type dockerService struct {
|
2016-09-26 07:46:29 +00:00
|
|
|
seccompProfileRoot string
|
|
|
|
client dockertools.DockerInterface
|
2016-10-14 18:52:18 +00:00
|
|
|
os kubecontainer.OSInterface
|
2016-09-26 14:18:06 +00:00
|
|
|
podSandboxImage string
|
2016-10-26 23:34:45 +00:00
|
|
|
streamingRuntime *streamingRuntime
|
|
|
|
streamingServer streaming.Server
|
2016-10-25 03:42:20 +00:00
|
|
|
networkPlugin network.NetworkPlugin
|
2016-10-10 20:56:53 +00:00
|
|
|
containerManager cm.ContainerManager
|
2016-07-22 21:24:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Version returns the runtime name, runtime version and runtime API version
|
2016-09-14 23:48:01 +00:00
|
|
|
func (ds *dockerService) Version(_ string) (*runtimeApi.VersionResponse, error) {
|
2016-07-22 21:24:05 +00:00
|
|
|
v, err := ds.client.Version()
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("docker: failed to get docker version: %v", err)
|
|
|
|
}
|
|
|
|
runtimeAPIVersion := kubeAPIVersion
|
|
|
|
name := dockerRuntimeName
|
2016-09-14 23:01:12 +00:00
|
|
|
// Docker API version (e.g., 1.23) is not semver compatible. Add a ".0"
|
|
|
|
// suffix to remedy this.
|
|
|
|
apiVersion := fmt.Sprintf("%s.0", v.APIVersion)
|
2016-07-22 21:24:05 +00:00
|
|
|
return &runtimeApi.VersionResponse{
|
|
|
|
Version: &runtimeAPIVersion,
|
|
|
|
RuntimeName: &name,
|
|
|
|
RuntimeVersion: &v.Version,
|
2016-09-14 23:01:12 +00:00
|
|
|
RuntimeApiVersion: &apiVersion,
|
2016-07-22 21:24:05 +00:00
|
|
|
}, nil
|
|
|
|
}
|
2016-10-07 19:32:57 +00:00
|
|
|
|
2016-10-28 23:53:33 +00:00
|
|
|
// UpdateRuntimeConfig updates the runtime config. Currently only handles podCIDR updates.
|
|
|
|
func (ds *dockerService) UpdateRuntimeConfig(runtimeConfig *runtimeApi.RuntimeConfig) (err error) {
|
|
|
|
if runtimeConfig == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
glog.Infof("docker cri received runtime config %+v", runtimeConfig)
|
|
|
|
if ds.networkPlugin != nil && runtimeConfig.NetworkConfig.PodCidr != nil {
|
|
|
|
event := make(map[string]interface{})
|
|
|
|
event[network.NET_PLUGIN_EVENT_POD_CIDR_CHANGE_DETAIL_CIDR] = *runtimeConfig.NetworkConfig.PodCidr
|
|
|
|
ds.networkPlugin.Event(network.NET_PLUGIN_EVENT_POD_CIDR_CHANGE, event)
|
|
|
|
}
|
|
|
|
return
|
2016-10-07 19:32:57 +00:00
|
|
|
}
|
2016-10-29 00:01:06 +00:00
|
|
|
|
|
|
|
// namespaceGetter is a wrapper around the dockerService that implements
|
|
|
|
// the network.NamespaceGetter interface.
|
|
|
|
type namespaceGetter struct {
|
|
|
|
*dockerService
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetNetNS returns the network namespace of the given containerID. The ID
|
|
|
|
// supplied is typically the ID of a pod sandbox. This getter doesn't try
|
|
|
|
// to map non-sandbox IDs to their respective sandboxes.
|
|
|
|
func (ds *dockerService) GetNetNS(podSandboxID string) (string, error) {
|
|
|
|
r, err := ds.client.InspectContainer(podSandboxID)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
return getNetworkNamespace(r), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// dockerNetworkHost implements network.Host by wrapping the legacy host
|
|
|
|
// passed in by the kubelet and adding NamespaceGetter methods. The legacy
|
|
|
|
// host methods are slated for deletion.
|
|
|
|
type dockerNetworkHost struct {
|
|
|
|
network.LegacyHost
|
|
|
|
*namespaceGetter
|
|
|
|
}
|
2016-10-10 20:56:53 +00:00
|
|
|
|
|
|
|
// Start initializes and starts components in dockerService.
|
|
|
|
func (ds *dockerService) Start() error {
|
|
|
|
return ds.containerManager.Start()
|
|
|
|
}
|