k3s/vendor/github.com/containernetworking/cni/CONVENTIONS.md
Darren Shepherd fa08d6076c Update vendor
2019-01-11 21:58:27 -07:00

7.5 KiB

Extension conventions

There are three ways of passing information to plugins using the Container Network Interface (CNI), none of which require the spec to be updated. These are

  • plugin specific fields in the JSON config
  • args field in the JSON config
  • CNI_ARGS environment variable

This document aims to provide guidance on which method should be used and to provide a convention for how common information should be passed. Establishing these conventions allows plugins to work across multiple runtimes. This helps both plugins and the runtimes.

Plugins

  • Plugin authors should aim to support these conventions where it makes sense for their plugin. This means they are more likely to "just work" with a wider range of runtimes.
  • Plugins should accept arguments according to these conventions if they implement the same basic functionality as other plugins. If plugins have shared functionality that isn't coverered by these conventions then a PR should be opened against this document.

Runtimes

  • Runtime authors should follow these conventions if they want to pass additional information to plugins. This will allow the extra information to be consumed by the widest range of plugins.
  • These conventions serve as an abstraction for the runtime. For example, port forwarding is highly implementation specific, but users should be able to select the plugin of their choice without changing the runtime.

Current conventions

Additional conventions can be created by creating PRs which modify this document.

Plugin specific fields

Plugin specific fields formed part of the original CNI spec and have been present since the initial release.

Plugins may define additional fields that they accept and may generate an error if called with unknown fields. The exception to this is the args field may be used to pass arbitrary data which may be ignored by plugins.

A plugin can define any additional fields it needs to work properly. It is expected that it will return an error if it can't act on fields that were expected or where the field values were malformed.

This method of passing information to a plugin is recommended when the following conditions hold

  • The configuration has specific meaning to the plugin (i.e. it's not just general meta data)
  • the plugin is expected to act on the configuration or return an error if it can't

Dynamic information (i.e. data that a runtime fills out) should be placed in a runtimeConfig section.

Area Purpose Spec and Example Runtime implementations Plugin Implementations
port mappings Pass mapping from ports on the host to ports in the container network namespace. Operators can ask runtimes to pass port mapping information to plugins, by setting the following in the CNI config
"capabilities": {"portMappings": true} 
Runtimes should fill in the actual port mappings when the config is passed to plugins. It should be placed in a new section of the config "runtimeConfig" e.g.
"runtimeConfig": {
"portMappings" : [
{ "hostPort": 8080, "containerPort": 80, "protocol": "tcp" },
{ "hostPort": 8000, "containerPort": 8001, "protocol": "udp" }
]
}
none none

For example, the configuration for a port mapping plugin might look like this to an operator (it should be included as part of a network configuration list.

{
  "name" : "ExamplePlugin",
  "type" : "port-mapper",
  "capabilities": {"portMappings": true}
}

But the runtime would fill in the mappings so the plugin itself would receive something like this.

{
  "name" : "ExamplePlugin",
  "type" : "port-mapper",
  "runtimeConfig": {
    "portMappings": [
      {"hostPort": 8080, "containerPort": 80, "protocol": "tcp"}
    ]
  }
}

"args" in network config

args in network config were introduced as an optional field into the 0.2.0 release of the CNI spec. The first CNI code release that it appeared in was v0.4.0.

args (dictionary): Optional additional arguments provided by the container runtime. For example a dictionary of labels could be passed to CNI plugins by adding them to a labels field under args.

args provide a way of providing more structured data than the flat strings that CNI_ARGS can support.

args should be used for optional meta-data. Runtimes can place additional data in args and plugins that don't understand that data should just ignore it. Runtimes should not require that a plugin understands or consumes that data provided, and so a runtime should not expect to receive an error if the data could not be acted on.

This method of passing information to a plugin is recommended when the information is optional and the plugin can choose to ignore it. It's often that case that such information is passed to all plugins by the runtime whithout regard for whether the plugin can understand it.

The conventions documented here are all namepaced under cni so they don't conflict with any existing args.

For example:

{  
   "cniVersion":"0.2.0",
   "name":"net",
   "args":{  
      "cni":{  
         "labels": [{"key": "app", "value": "myapp"}]
      }
   },
   <REST OF CNI CONFIG HERE>
   "ipam":{  
     <IPAM CONFIG HERE>
   }
}
Area Purpose Spec and Example Runtime implementations Plugin Implementations
labels Passkey=value labels to plugins
"labels" : [
{ "key" : "app", "value" : "myapp" },
{ "key" : "env", "value" : "prod" }
]
none none

CNI_ARGS

CNI_ARGS formed part of the original CNI spec and have been present since the initial release.

CNI_ARGS: Extra arguments passed in by the user at invocation time. Alphanumeric key-value pairs separated by semicolons; for example, "FOO=BAR;ABC=123"

The use of CNI_ARGS is deprecated and "args" should be used instead.

Field Purpose Spec and Example Runtime implementations Plugin Implementations
IP Request a specific IP from IPAM plugins IP=192.168.10.4 rkt supports passing additional arguments to plugins and the documentation suggests IP can be used. host-local (since version v0.2.0) supports the field for IPv4 only - documentation.

Chained Plugins

If plugins are agnostic about the type of interface created, they SHOULD work in a chained mode and configure existing interfaces. Plugins MAY also create the desired interface when not run in a chain.

For example, the bridge plugin adds the host-side interface to a bridge. So, it should accept any previous result that includes a host-side interface, including tap devices. If not called as a chained plugin, it creates a veth pair first.

Plugins that meet this convention are usable by a larger set of runtimes and interfaces, including hypervisors and DPDK providers.