mirror of
https://github.com/k3s-io/k3s.git
synced 2024-06-07 19:41:36 +00:00
277 lines
9.8 KiB
Go
277 lines
9.8 KiB
Go
/*
|
|
Copyright 2017 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package server
|
|
|
|
import (
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
"path/filepath"
|
|
"time"
|
|
|
|
"github.com/containerd/containerd"
|
|
"github.com/containerd/containerd/plugin"
|
|
cni "github.com/containerd/go-cni"
|
|
runcapparmor "github.com/opencontainers/runc/libcontainer/apparmor"
|
|
runcseccomp "github.com/opencontainers/runc/libcontainer/seccomp"
|
|
runcsystem "github.com/opencontainers/runc/libcontainer/system"
|
|
"github.com/opencontainers/selinux/go-selinux"
|
|
"github.com/pkg/errors"
|
|
"github.com/sirupsen/logrus"
|
|
"google.golang.org/grpc"
|
|
runtime "k8s.io/cri-api/pkg/apis/runtime/v1alpha2"
|
|
"k8s.io/kubernetes/pkg/kubelet/server/streaming"
|
|
|
|
api "github.com/containerd/cri/pkg/api/v1"
|
|
"github.com/containerd/cri/pkg/atomic"
|
|
criconfig "github.com/containerd/cri/pkg/config"
|
|
ctrdutil "github.com/containerd/cri/pkg/containerd/util"
|
|
osinterface "github.com/containerd/cri/pkg/os"
|
|
"github.com/containerd/cri/pkg/registrar"
|
|
containerstore "github.com/containerd/cri/pkg/store/container"
|
|
imagestore "github.com/containerd/cri/pkg/store/image"
|
|
sandboxstore "github.com/containerd/cri/pkg/store/sandbox"
|
|
snapshotstore "github.com/containerd/cri/pkg/store/snapshot"
|
|
)
|
|
|
|
// grpcServices are all the grpc services provided by cri containerd.
|
|
type grpcServices interface {
|
|
runtime.RuntimeServiceServer
|
|
runtime.ImageServiceServer
|
|
api.CRIPluginServiceServer
|
|
}
|
|
|
|
// CRIService is the interface implement CRI remote service server.
|
|
type CRIService interface {
|
|
Run() error
|
|
// io.Closer is used by containerd to gracefully stop cri service.
|
|
io.Closer
|
|
plugin.Service
|
|
grpcServices
|
|
}
|
|
|
|
// criService implements CRIService.
|
|
type criService struct {
|
|
// config contains all configurations.
|
|
config criconfig.Config
|
|
// imageFSPath is the path to image filesystem.
|
|
imageFSPath string
|
|
// apparmorEnabled indicates whether apparmor is enabled.
|
|
apparmorEnabled bool
|
|
// seccompEnabled indicates whether seccomp is enabled.
|
|
seccompEnabled bool
|
|
// os is an interface for all required os operations.
|
|
os osinterface.OS
|
|
// sandboxStore stores all resources associated with sandboxes.
|
|
sandboxStore *sandboxstore.Store
|
|
// sandboxNameIndex stores all sandbox names and make sure each name
|
|
// is unique.
|
|
sandboxNameIndex *registrar.Registrar
|
|
// containerStore stores all resources associated with containers.
|
|
containerStore *containerstore.Store
|
|
// containerNameIndex stores all container names and make sure each
|
|
// name is unique.
|
|
containerNameIndex *registrar.Registrar
|
|
// imageStore stores all resources associated with images.
|
|
imageStore *imagestore.Store
|
|
// snapshotStore stores information of all snapshots.
|
|
snapshotStore *snapshotstore.Store
|
|
// netPlugin is used to setup and teardown network when run/stop pod sandbox.
|
|
netPlugin cni.CNI
|
|
// client is an instance of the containerd client
|
|
client *containerd.Client
|
|
// streamServer is the streaming server serves container streaming request.
|
|
streamServer streaming.Server
|
|
// eventMonitor is the monitor monitors containerd events.
|
|
eventMonitor *eventMonitor
|
|
// initialized indicates whether the server is initialized. All GRPC services
|
|
// should return error before the server is initialized.
|
|
initialized atomic.Bool
|
|
}
|
|
|
|
// NewCRIService returns a new instance of CRIService
|
|
func NewCRIService(config criconfig.Config, client *containerd.Client) (CRIService, error) {
|
|
var err error
|
|
c := &criService{
|
|
config: config,
|
|
client: client,
|
|
apparmorEnabled: runcapparmor.IsEnabled() && !config.DisableApparmor,
|
|
seccompEnabled: runcseccomp.IsEnabled(),
|
|
os: osinterface.RealOS{},
|
|
sandboxStore: sandboxstore.NewStore(),
|
|
containerStore: containerstore.NewStore(),
|
|
imageStore: imagestore.NewStore(client),
|
|
snapshotStore: snapshotstore.NewStore(),
|
|
sandboxNameIndex: registrar.NewRegistrar(),
|
|
containerNameIndex: registrar.NewRegistrar(),
|
|
initialized: atomic.NewBool(false),
|
|
}
|
|
|
|
if runcsystem.RunningInUserNS() {
|
|
if !(config.DisableCgroup && !c.apparmorEnabled && config.RestrictOOMScoreAdj) {
|
|
logrus.Warn("Running containerd in a user namespace typically requires disable_cgroup, disable_apparmor, restrict_oom_score_adj set to be true")
|
|
}
|
|
}
|
|
|
|
if c.config.EnableSelinux {
|
|
if !selinux.GetEnabled() {
|
|
logrus.Warn("Selinux is not supported")
|
|
}
|
|
} else {
|
|
selinux.SetDisabled()
|
|
}
|
|
|
|
if client.SnapshotService(c.config.ContainerdConfig.Snapshotter) == nil {
|
|
return nil, errors.Errorf("failed to find snapshotter %q", c.config.ContainerdConfig.Snapshotter)
|
|
}
|
|
|
|
c.imageFSPath = imageFSPath(config.ContainerdRootDir, config.ContainerdConfig.Snapshotter)
|
|
logrus.Infof("Get image filesystem path %q", c.imageFSPath)
|
|
|
|
// Pod needs to attach to atleast loopback network and a non host network,
|
|
// hence networkAttachCount is 2. If there are more network configs the
|
|
// pod will be attached to all the networks but we will only use the ip
|
|
// of the default network interface as the pod IP.
|
|
c.netPlugin, err = cni.New(cni.WithMinNetworkCount(networkAttachCount),
|
|
cni.WithPluginConfDir(config.NetworkPluginConfDir),
|
|
cni.WithPluginDir([]string{config.NetworkPluginBinDir}))
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "failed to initialize cni")
|
|
}
|
|
|
|
// Try to load the config if it exists. Just log the error if load fails
|
|
// This is not disruptive for containerd to panic
|
|
if err := c.netPlugin.Load(cni.WithLoNetwork, cni.WithDefaultConf); err != nil {
|
|
logrus.WithError(err).Error("Failed to load cni during init, please check CRI plugin status before setting up network for pods")
|
|
}
|
|
// prepare streaming server
|
|
c.streamServer, err = newStreamServer(c, config.StreamServerAddress, config.StreamServerPort)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "failed to create stream server")
|
|
}
|
|
|
|
c.eventMonitor = newEventMonitor(c)
|
|
|
|
return c, nil
|
|
}
|
|
|
|
// Register registers all required services onto a specific grpc server.
|
|
// This is used by containerd cri plugin.
|
|
func (c *criService) Register(s *grpc.Server) error {
|
|
instrumented := newInstrumentedService(c)
|
|
runtime.RegisterRuntimeServiceServer(s, instrumented)
|
|
runtime.RegisterImageServiceServer(s, instrumented)
|
|
api.RegisterCRIPluginServiceServer(s, instrumented)
|
|
return nil
|
|
}
|
|
|
|
// Run starts the CRI service.
|
|
func (c *criService) Run() error {
|
|
logrus.Info("Start subscribing containerd event")
|
|
c.eventMonitor.subscribe(c.client)
|
|
|
|
logrus.Infof("Start recovering state")
|
|
if err := c.recover(ctrdutil.NamespacedContext()); err != nil {
|
|
return errors.Wrap(err, "failed to recover state")
|
|
}
|
|
|
|
// Start event handler.
|
|
logrus.Info("Start event monitor")
|
|
eventMonitorErrCh := c.eventMonitor.start()
|
|
|
|
// Start snapshot stats syncer, it doesn't need to be stopped.
|
|
logrus.Info("Start snapshots syncer")
|
|
snapshotsSyncer := newSnapshotsSyncer(
|
|
c.snapshotStore,
|
|
c.client.SnapshotService(c.config.ContainerdConfig.Snapshotter),
|
|
time.Duration(c.config.StatsCollectPeriod)*time.Second,
|
|
)
|
|
snapshotsSyncer.start()
|
|
|
|
// Start streaming server.
|
|
logrus.Info("Start streaming server")
|
|
streamServerErrCh := make(chan error)
|
|
go func() {
|
|
defer close(streamServerErrCh)
|
|
if err := c.streamServer.Start(true); err != nil && err != http.ErrServerClosed {
|
|
logrus.WithError(err).Error("Failed to start streaming server")
|
|
streamServerErrCh <- err
|
|
}
|
|
}()
|
|
|
|
// Set the server as initialized. GRPC services could start serving traffic.
|
|
c.initialized.Set()
|
|
|
|
var eventMonitorErr, streamServerErr error
|
|
// Stop the whole CRI service if any of the critical service exits.
|
|
select {
|
|
case eventMonitorErr = <-eventMonitorErrCh:
|
|
case streamServerErr = <-streamServerErrCh:
|
|
}
|
|
if err := c.Close(); err != nil {
|
|
return errors.Wrap(err, "failed to stop cri service")
|
|
}
|
|
// If the error is set above, err from channel must be nil here, because
|
|
// the channel is supposed to be closed. Or else, we wait and set it.
|
|
if err := <-eventMonitorErrCh; err != nil {
|
|
eventMonitorErr = err
|
|
}
|
|
logrus.Info("Event monitor stopped")
|
|
// There is a race condition with http.Server.Serve.
|
|
// When `Close` is called at the same time with `Serve`, `Close`
|
|
// may finish first, and `Serve` may still block.
|
|
// See https://github.com/golang/go/issues/20239.
|
|
// Here we set a 2 second timeout for the stream server wait,
|
|
// if it timeout, an error log is generated.
|
|
// TODO(random-liu): Get rid of this after https://github.com/golang/go/issues/20239
|
|
// is fixed.
|
|
const streamServerStopTimeout = 2 * time.Second
|
|
select {
|
|
case err := <-streamServerErrCh:
|
|
if err != nil {
|
|
streamServerErr = err
|
|
}
|
|
logrus.Info("Stream server stopped")
|
|
case <-time.After(streamServerStopTimeout):
|
|
logrus.Errorf("Stream server is not stopped in %q", streamServerStopTimeout)
|
|
}
|
|
if eventMonitorErr != nil {
|
|
return errors.Wrap(eventMonitorErr, "event monitor error")
|
|
}
|
|
if streamServerErr != nil {
|
|
return errors.Wrap(streamServerErr, "stream server error")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Close stops the CRI service.
|
|
// TODO(random-liu): Make close synchronous.
|
|
func (c *criService) Close() error {
|
|
logrus.Info("Stop CRI service")
|
|
c.eventMonitor.stop()
|
|
if err := c.streamServer.Stop(); err != nil {
|
|
return errors.Wrap(err, "failed to stop stream server")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// imageFSPath returns containerd image filesystem path.
|
|
// Note that if containerd changes directory layout, we also needs to change this.
|
|
func imageFSPath(rootDir, snapshotter string) string {
|
|
return filepath.Join(rootDir, fmt.Sprintf("%s.%s", plugin.SnapshotPlugin, snapshotter))
|
|
}
|