mirror of
https://github.com/k3s-io/k3s.git
synced 2024-06-07 19:41:36 +00:00
674 lines
21 KiB
Go
674 lines
21 KiB
Go
// Copyright 2015 CNI authors
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package libcni
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"os"
|
|
"path/filepath"
|
|
"strings"
|
|
|
|
"github.com/containernetworking/cni/pkg/invoke"
|
|
"github.com/containernetworking/cni/pkg/types"
|
|
"github.com/containernetworking/cni/pkg/utils"
|
|
"github.com/containernetworking/cni/pkg/version"
|
|
)
|
|
|
|
var (
|
|
CacheDir = "/var/lib/cni"
|
|
)
|
|
|
|
const (
|
|
CNICacheV1 = "cniCacheV1"
|
|
)
|
|
|
|
// A RuntimeConf holds the arguments to one invocation of a CNI plugin
|
|
// excepting the network configuration, with the nested exception that
|
|
// the `runtimeConfig` from the network configuration is included
|
|
// here.
|
|
type RuntimeConf struct {
|
|
ContainerID string
|
|
NetNS string
|
|
IfName string
|
|
Args [][2]string
|
|
// A dictionary of capability-specific data passed by the runtime
|
|
// to plugins as top-level keys in the 'runtimeConfig' dictionary
|
|
// of the plugin's stdin data. libcni will ensure that only keys
|
|
// in this map which match the capabilities of the plugin are passed
|
|
// to the plugin
|
|
CapabilityArgs map[string]interface{}
|
|
|
|
// DEPRECATED. Will be removed in a future release.
|
|
CacheDir string
|
|
}
|
|
|
|
type NetworkConfig struct {
|
|
Network *types.NetConf
|
|
Bytes []byte
|
|
}
|
|
|
|
type NetworkConfigList struct {
|
|
Name string
|
|
CNIVersion string
|
|
DisableCheck bool
|
|
Plugins []*NetworkConfig
|
|
Bytes []byte
|
|
}
|
|
|
|
type CNI interface {
|
|
AddNetworkList(ctx context.Context, net *NetworkConfigList, rt *RuntimeConf) (types.Result, error)
|
|
CheckNetworkList(ctx context.Context, net *NetworkConfigList, rt *RuntimeConf) error
|
|
DelNetworkList(ctx context.Context, net *NetworkConfigList, rt *RuntimeConf) error
|
|
GetNetworkListCachedResult(net *NetworkConfigList, rt *RuntimeConf) (types.Result, error)
|
|
GetNetworkListCachedConfig(net *NetworkConfigList, rt *RuntimeConf) ([]byte, *RuntimeConf, error)
|
|
|
|
AddNetwork(ctx context.Context, net *NetworkConfig, rt *RuntimeConf) (types.Result, error)
|
|
CheckNetwork(ctx context.Context, net *NetworkConfig, rt *RuntimeConf) error
|
|
DelNetwork(ctx context.Context, net *NetworkConfig, rt *RuntimeConf) error
|
|
GetNetworkCachedResult(net *NetworkConfig, rt *RuntimeConf) (types.Result, error)
|
|
GetNetworkCachedConfig(net *NetworkConfig, rt *RuntimeConf) ([]byte, *RuntimeConf, error)
|
|
|
|
ValidateNetworkList(ctx context.Context, net *NetworkConfigList) ([]string, error)
|
|
ValidateNetwork(ctx context.Context, net *NetworkConfig) ([]string, error)
|
|
}
|
|
|
|
type CNIConfig struct {
|
|
Path []string
|
|
exec invoke.Exec
|
|
cacheDir string
|
|
}
|
|
|
|
// CNIConfig implements the CNI interface
|
|
var _ CNI = &CNIConfig{}
|
|
|
|
// NewCNIConfig returns a new CNIConfig object that will search for plugins
|
|
// in the given paths and use the given exec interface to run those plugins,
|
|
// or if the exec interface is not given, will use a default exec handler.
|
|
func NewCNIConfig(path []string, exec invoke.Exec) *CNIConfig {
|
|
return NewCNIConfigWithCacheDir(path, "", exec)
|
|
}
|
|
|
|
// NewCNIConfigWithCacheDir returns a new CNIConfig object that will search for plugins
|
|
// in the given paths use the given exec interface to run those plugins,
|
|
// or if the exec interface is not given, will use a default exec handler.
|
|
// The given cache directory will be used for temporary data storage when needed.
|
|
func NewCNIConfigWithCacheDir(path []string, cacheDir string, exec invoke.Exec) *CNIConfig {
|
|
return &CNIConfig{
|
|
Path: path,
|
|
cacheDir: cacheDir,
|
|
exec: exec,
|
|
}
|
|
}
|
|
|
|
func buildOneConfig(name, cniVersion string, orig *NetworkConfig, prevResult types.Result, rt *RuntimeConf) (*NetworkConfig, error) {
|
|
var err error
|
|
|
|
inject := map[string]interface{}{
|
|
"name": name,
|
|
"cniVersion": cniVersion,
|
|
}
|
|
// Add previous plugin result
|
|
if prevResult != nil {
|
|
inject["prevResult"] = prevResult
|
|
}
|
|
|
|
// Ensure every config uses the same name and version
|
|
orig, err = InjectConf(orig, inject)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return injectRuntimeConfig(orig, rt)
|
|
}
|
|
|
|
// This function takes a libcni RuntimeConf structure and injects values into
|
|
// a "runtimeConfig" dictionary in the CNI network configuration JSON that
|
|
// will be passed to the plugin on stdin.
|
|
//
|
|
// Only "capabilities arguments" passed by the runtime are currently injected.
|
|
// These capabilities arguments are filtered through the plugin's advertised
|
|
// capabilities from its config JSON, and any keys in the CapabilityArgs
|
|
// matching plugin capabilities are added to the "runtimeConfig" dictionary
|
|
// sent to the plugin via JSON on stdin. For example, if the plugin's
|
|
// capabilities include "portMappings", and the CapabilityArgs map includes a
|
|
// "portMappings" key, that key and its value are added to the "runtimeConfig"
|
|
// dictionary to be passed to the plugin's stdin.
|
|
func injectRuntimeConfig(orig *NetworkConfig, rt *RuntimeConf) (*NetworkConfig, error) {
|
|
var err error
|
|
|
|
rc := make(map[string]interface{})
|
|
for capability, supported := range orig.Network.Capabilities {
|
|
if !supported {
|
|
continue
|
|
}
|
|
if data, ok := rt.CapabilityArgs[capability]; ok {
|
|
rc[capability] = data
|
|
}
|
|
}
|
|
|
|
if len(rc) > 0 {
|
|
orig, err = InjectConf(orig, map[string]interface{}{"runtimeConfig": rc})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
return orig, nil
|
|
}
|
|
|
|
// ensure we have a usable exec if the CNIConfig was not given one
|
|
func (c *CNIConfig) ensureExec() invoke.Exec {
|
|
if c.exec == nil {
|
|
c.exec = &invoke.DefaultExec{
|
|
RawExec: &invoke.RawExec{Stderr: os.Stderr},
|
|
PluginDecoder: version.PluginDecoder{},
|
|
}
|
|
}
|
|
return c.exec
|
|
}
|
|
|
|
type cachedInfo struct {
|
|
Kind string `json:"kind"`
|
|
ContainerID string `json:"containerId"`
|
|
Config []byte `json:"config"`
|
|
IfName string `json:"ifName"`
|
|
NetworkName string `json:"networkName"`
|
|
CniArgs [][2]string `json:"cniArgs,omitempty"`
|
|
CapabilityArgs map[string]interface{} `json:"capabilityArgs,omitempty"`
|
|
RawResult map[string]interface{} `json:"result,omitempty"`
|
|
Result types.Result `json:"-"`
|
|
}
|
|
|
|
// getCacheDir returns the cache directory in this order:
|
|
// 1) global cacheDir from CNIConfig object
|
|
// 2) deprecated cacheDir from RuntimeConf object
|
|
// 3) fall back to default cache directory
|
|
func (c *CNIConfig) getCacheDir(rt *RuntimeConf) string {
|
|
if c.cacheDir != "" {
|
|
return c.cacheDir
|
|
}
|
|
if rt.CacheDir != "" {
|
|
return rt.CacheDir
|
|
}
|
|
return CacheDir
|
|
}
|
|
|
|
func (c *CNIConfig) getCacheFilePath(netName string, rt *RuntimeConf) (string, error) {
|
|
if netName == "" || rt.ContainerID == "" || rt.IfName == "" {
|
|
return "", fmt.Errorf("cache file path requires network name (%q), container ID (%q), and interface name (%q)", netName, rt.ContainerID, rt.IfName)
|
|
}
|
|
return filepath.Join(c.getCacheDir(rt), "results", fmt.Sprintf("%s-%s-%s", netName, rt.ContainerID, rt.IfName)), nil
|
|
}
|
|
|
|
func (c *CNIConfig) cacheAdd(result types.Result, config []byte, netName string, rt *RuntimeConf) error {
|
|
cached := cachedInfo{
|
|
Kind: CNICacheV1,
|
|
ContainerID: rt.ContainerID,
|
|
Config: config,
|
|
IfName: rt.IfName,
|
|
NetworkName: netName,
|
|
CniArgs: rt.Args,
|
|
CapabilityArgs: rt.CapabilityArgs,
|
|
}
|
|
|
|
// We need to get type.Result into cachedInfo as JSON map
|
|
// Marshal to []byte, then Unmarshal into cached.RawResult
|
|
data, err := json.Marshal(result)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = json.Unmarshal(data, &cached.RawResult)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
newBytes, err := json.Marshal(&cached)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
fname, err := c.getCacheFilePath(netName, rt)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if err := os.MkdirAll(filepath.Dir(fname), 0700); err != nil {
|
|
return err
|
|
}
|
|
|
|
return ioutil.WriteFile(fname, newBytes, 0600)
|
|
}
|
|
|
|
func (c *CNIConfig) cacheDel(netName string, rt *RuntimeConf) error {
|
|
fname, err := c.getCacheFilePath(netName, rt)
|
|
if err != nil {
|
|
// Ignore error
|
|
return nil
|
|
}
|
|
return os.Remove(fname)
|
|
}
|
|
|
|
func (c *CNIConfig) getCachedConfig(netName string, rt *RuntimeConf) ([]byte, *RuntimeConf, error) {
|
|
var bytes []byte
|
|
|
|
fname, err := c.getCacheFilePath(netName, rt)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
bytes, err = ioutil.ReadFile(fname)
|
|
if err != nil {
|
|
// Ignore read errors; the cached result may not exist on-disk
|
|
return nil, nil, nil
|
|
}
|
|
|
|
unmarshaled := cachedInfo{}
|
|
if err := json.Unmarshal(bytes, &unmarshaled); err != nil {
|
|
return nil, nil, fmt.Errorf("failed to unmarshal cached network %q config: %v", netName, err)
|
|
}
|
|
if unmarshaled.Kind != CNICacheV1 {
|
|
return nil, nil, fmt.Errorf("read cached network %q config has wrong kind: %v", netName, unmarshaled.Kind)
|
|
}
|
|
|
|
newRt := *rt
|
|
if unmarshaled.CniArgs != nil {
|
|
newRt.Args = unmarshaled.CniArgs
|
|
}
|
|
newRt.CapabilityArgs = unmarshaled.CapabilityArgs
|
|
|
|
return unmarshaled.Config, &newRt, nil
|
|
}
|
|
|
|
func (c *CNIConfig) getLegacyCachedResult(netName, cniVersion string, rt *RuntimeConf) (types.Result, error) {
|
|
fname, err := c.getCacheFilePath(netName, rt)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
data, err := ioutil.ReadFile(fname)
|
|
if err != nil {
|
|
// Ignore read errors; the cached result may not exist on-disk
|
|
return nil, nil
|
|
}
|
|
|
|
// Read the version of the cached result
|
|
decoder := version.ConfigDecoder{}
|
|
resultCniVersion, err := decoder.Decode(data)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Ensure we can understand the result
|
|
result, err := version.NewResult(resultCniVersion, data)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Convert to the config version to ensure plugins get prevResult
|
|
// in the same version as the config. The cached result version
|
|
// should match the config version unless the config was changed
|
|
// while the container was running.
|
|
result, err = result.GetAsVersion(cniVersion)
|
|
if err != nil && resultCniVersion != cniVersion {
|
|
return nil, fmt.Errorf("failed to convert cached result version %q to config version %q: %v", resultCniVersion, cniVersion, err)
|
|
}
|
|
return result, err
|
|
}
|
|
|
|
func (c *CNIConfig) getCachedResult(netName, cniVersion string, rt *RuntimeConf) (types.Result, error) {
|
|
fname, err := c.getCacheFilePath(netName, rt)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
fdata, err := ioutil.ReadFile(fname)
|
|
if err != nil {
|
|
// Ignore read errors; the cached result may not exist on-disk
|
|
return nil, nil
|
|
}
|
|
|
|
cachedInfo := cachedInfo{}
|
|
if err := json.Unmarshal(fdata, &cachedInfo); err != nil || cachedInfo.Kind != CNICacheV1 {
|
|
return c.getLegacyCachedResult(netName, cniVersion, rt)
|
|
}
|
|
|
|
newBytes, err := json.Marshal(&cachedInfo.RawResult)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to marshal cached network %q config: %v", netName, err)
|
|
}
|
|
|
|
// Read the version of the cached result
|
|
decoder := version.ConfigDecoder{}
|
|
resultCniVersion, err := decoder.Decode(newBytes)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Ensure we can understand the result
|
|
result, err := version.NewResult(resultCniVersion, newBytes)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Convert to the config version to ensure plugins get prevResult
|
|
// in the same version as the config. The cached result version
|
|
// should match the config version unless the config was changed
|
|
// while the container was running.
|
|
result, err = result.GetAsVersion(cniVersion)
|
|
if err != nil && resultCniVersion != cniVersion {
|
|
return nil, fmt.Errorf("failed to convert cached result version %q to config version %q: %v", resultCniVersion, cniVersion, err)
|
|
}
|
|
return result, err
|
|
}
|
|
|
|
// GetNetworkListCachedResult returns the cached Result of the previous
|
|
// AddNetworkList() operation for a network list, or an error.
|
|
func (c *CNIConfig) GetNetworkListCachedResult(list *NetworkConfigList, rt *RuntimeConf) (types.Result, error) {
|
|
return c.getCachedResult(list.Name, list.CNIVersion, rt)
|
|
}
|
|
|
|
// GetNetworkCachedResult returns the cached Result of the previous
|
|
// AddNetwork() operation for a network, or an error.
|
|
func (c *CNIConfig) GetNetworkCachedResult(net *NetworkConfig, rt *RuntimeConf) (types.Result, error) {
|
|
return c.getCachedResult(net.Network.Name, net.Network.CNIVersion, rt)
|
|
}
|
|
|
|
// GetNetworkListCachedConfig copies the input RuntimeConf to output
|
|
// RuntimeConf with fields updated with info from the cached Config.
|
|
func (c *CNIConfig) GetNetworkListCachedConfig(list *NetworkConfigList, rt *RuntimeConf) ([]byte, *RuntimeConf, error) {
|
|
return c.getCachedConfig(list.Name, rt)
|
|
}
|
|
|
|
// GetNetworkCachedConfig copies the input RuntimeConf to output
|
|
// RuntimeConf with fields updated with info from the cached Config.
|
|
func (c *CNIConfig) GetNetworkCachedConfig(net *NetworkConfig, rt *RuntimeConf) ([]byte, *RuntimeConf, error) {
|
|
return c.getCachedConfig(net.Network.Name, rt)
|
|
}
|
|
|
|
func (c *CNIConfig) addNetwork(ctx context.Context, name, cniVersion string, net *NetworkConfig, prevResult types.Result, rt *RuntimeConf) (types.Result, error) {
|
|
c.ensureExec()
|
|
pluginPath, err := c.exec.FindInPath(net.Network.Type, c.Path)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if err := utils.ValidateContainerID(rt.ContainerID); err != nil {
|
|
return nil, err
|
|
}
|
|
if err := utils.ValidateNetworkName(name); err != nil {
|
|
return nil, err
|
|
}
|
|
if err := utils.ValidateInterfaceName(rt.IfName); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
newConf, err := buildOneConfig(name, cniVersion, net, prevResult, rt)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return invoke.ExecPluginWithResult(ctx, pluginPath, newConf.Bytes, c.args("ADD", rt), c.exec)
|
|
}
|
|
|
|
// AddNetworkList executes a sequence of plugins with the ADD command
|
|
func (c *CNIConfig) AddNetworkList(ctx context.Context, list *NetworkConfigList, rt *RuntimeConf) (types.Result, error) {
|
|
var err error
|
|
var result types.Result
|
|
for _, net := range list.Plugins {
|
|
result, err = c.addNetwork(ctx, list.Name, list.CNIVersion, net, result, rt)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
if err = c.cacheAdd(result, list.Bytes, list.Name, rt); err != nil {
|
|
return nil, fmt.Errorf("failed to set network %q cached result: %v", list.Name, err)
|
|
}
|
|
|
|
return result, nil
|
|
}
|
|
|
|
func (c *CNIConfig) checkNetwork(ctx context.Context, name, cniVersion string, net *NetworkConfig, prevResult types.Result, rt *RuntimeConf) error {
|
|
c.ensureExec()
|
|
pluginPath, err := c.exec.FindInPath(net.Network.Type, c.Path)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
newConf, err := buildOneConfig(name, cniVersion, net, prevResult, rt)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return invoke.ExecPluginWithoutResult(ctx, pluginPath, newConf.Bytes, c.args("CHECK", rt), c.exec)
|
|
}
|
|
|
|
// CheckNetworkList executes a sequence of plugins with the CHECK command
|
|
func (c *CNIConfig) CheckNetworkList(ctx context.Context, list *NetworkConfigList, rt *RuntimeConf) error {
|
|
// CHECK was added in CNI spec version 0.4.0 and higher
|
|
if gtet, err := version.GreaterThanOrEqualTo(list.CNIVersion, "0.4.0"); err != nil {
|
|
return err
|
|
} else if !gtet {
|
|
return fmt.Errorf("configuration version %q does not support the CHECK command", list.CNIVersion)
|
|
}
|
|
|
|
if list.DisableCheck {
|
|
return nil
|
|
}
|
|
|
|
cachedResult, err := c.getCachedResult(list.Name, list.CNIVersion, rt)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to get network %q cached result: %v", list.Name, err)
|
|
}
|
|
|
|
for _, net := range list.Plugins {
|
|
if err := c.checkNetwork(ctx, list.Name, list.CNIVersion, net, cachedResult, rt); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (c *CNIConfig) delNetwork(ctx context.Context, name, cniVersion string, net *NetworkConfig, prevResult types.Result, rt *RuntimeConf) error {
|
|
c.ensureExec()
|
|
pluginPath, err := c.exec.FindInPath(net.Network.Type, c.Path)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
newConf, err := buildOneConfig(name, cniVersion, net, prevResult, rt)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return invoke.ExecPluginWithoutResult(ctx, pluginPath, newConf.Bytes, c.args("DEL", rt), c.exec)
|
|
}
|
|
|
|
// DelNetworkList executes a sequence of plugins with the DEL command
|
|
func (c *CNIConfig) DelNetworkList(ctx context.Context, list *NetworkConfigList, rt *RuntimeConf) error {
|
|
var cachedResult types.Result
|
|
|
|
// Cached result on DEL was added in CNI spec version 0.4.0 and higher
|
|
if gtet, err := version.GreaterThanOrEqualTo(list.CNIVersion, "0.4.0"); err != nil {
|
|
return err
|
|
} else if gtet {
|
|
cachedResult, err = c.getCachedResult(list.Name, list.CNIVersion, rt)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to get network %q cached result: %v", list.Name, err)
|
|
}
|
|
}
|
|
|
|
for i := len(list.Plugins) - 1; i >= 0; i-- {
|
|
net := list.Plugins[i]
|
|
if err := c.delNetwork(ctx, list.Name, list.CNIVersion, net, cachedResult, rt); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
_ = c.cacheDel(list.Name, rt)
|
|
|
|
return nil
|
|
}
|
|
|
|
// AddNetwork executes the plugin with the ADD command
|
|
func (c *CNIConfig) AddNetwork(ctx context.Context, net *NetworkConfig, rt *RuntimeConf) (types.Result, error) {
|
|
result, err := c.addNetwork(ctx, net.Network.Name, net.Network.CNIVersion, net, nil, rt)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if err = c.cacheAdd(result, net.Bytes, net.Network.Name, rt); err != nil {
|
|
return nil, fmt.Errorf("failed to set network %q cached result: %v", net.Network.Name, err)
|
|
}
|
|
|
|
return result, nil
|
|
}
|
|
|
|
// CheckNetwork executes the plugin with the CHECK command
|
|
func (c *CNIConfig) CheckNetwork(ctx context.Context, net *NetworkConfig, rt *RuntimeConf) error {
|
|
// CHECK was added in CNI spec version 0.4.0 and higher
|
|
if gtet, err := version.GreaterThanOrEqualTo(net.Network.CNIVersion, "0.4.0"); err != nil {
|
|
return err
|
|
} else if !gtet {
|
|
return fmt.Errorf("configuration version %q does not support the CHECK command", net.Network.CNIVersion)
|
|
}
|
|
|
|
cachedResult, err := c.getCachedResult(net.Network.Name, net.Network.CNIVersion, rt)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to get network %q cached result: %v", net.Network.Name, err)
|
|
}
|
|
return c.checkNetwork(ctx, net.Network.Name, net.Network.CNIVersion, net, cachedResult, rt)
|
|
}
|
|
|
|
// DelNetwork executes the plugin with the DEL command
|
|
func (c *CNIConfig) DelNetwork(ctx context.Context, net *NetworkConfig, rt *RuntimeConf) error {
|
|
var cachedResult types.Result
|
|
|
|
// Cached result on DEL was added in CNI spec version 0.4.0 and higher
|
|
if gtet, err := version.GreaterThanOrEqualTo(net.Network.CNIVersion, "0.4.0"); err != nil {
|
|
return err
|
|
} else if gtet {
|
|
cachedResult, err = c.getCachedResult(net.Network.Name, net.Network.CNIVersion, rt)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to get network %q cached result: %v", net.Network.Name, err)
|
|
}
|
|
}
|
|
|
|
if err := c.delNetwork(ctx, net.Network.Name, net.Network.CNIVersion, net, cachedResult, rt); err != nil {
|
|
return err
|
|
}
|
|
_ = c.cacheDel(net.Network.Name, rt)
|
|
return nil
|
|
}
|
|
|
|
// ValidateNetworkList checks that a configuration is reasonably valid.
|
|
// - all the specified plugins exist on disk
|
|
// - every plugin supports the desired version.
|
|
//
|
|
// Returns a list of all capabilities supported by the configuration, or error
|
|
func (c *CNIConfig) ValidateNetworkList(ctx context.Context, list *NetworkConfigList) ([]string, error) {
|
|
version := list.CNIVersion
|
|
|
|
// holding map for seen caps (in case of duplicates)
|
|
caps := map[string]interface{}{}
|
|
|
|
errs := []error{}
|
|
for _, net := range list.Plugins {
|
|
if err := c.validatePlugin(ctx, net.Network.Type, version); err != nil {
|
|
errs = append(errs, err)
|
|
}
|
|
for c, enabled := range net.Network.Capabilities {
|
|
if !enabled {
|
|
continue
|
|
}
|
|
caps[c] = struct{}{}
|
|
}
|
|
}
|
|
|
|
if len(errs) > 0 {
|
|
return nil, fmt.Errorf("%v", errs)
|
|
}
|
|
|
|
// make caps list
|
|
cc := make([]string, 0, len(caps))
|
|
for c := range caps {
|
|
cc = append(cc, c)
|
|
}
|
|
|
|
return cc, nil
|
|
}
|
|
|
|
// ValidateNetwork checks that a configuration is reasonably valid.
|
|
// It uses the same logic as ValidateNetworkList)
|
|
// Returns a list of capabilities
|
|
func (c *CNIConfig) ValidateNetwork(ctx context.Context, net *NetworkConfig) ([]string, error) {
|
|
caps := []string{}
|
|
for c, ok := range net.Network.Capabilities {
|
|
if ok {
|
|
caps = append(caps, c)
|
|
}
|
|
}
|
|
if err := c.validatePlugin(ctx, net.Network.Type, net.Network.CNIVersion); err != nil {
|
|
return nil, err
|
|
}
|
|
return caps, nil
|
|
}
|
|
|
|
// validatePlugin checks that an individual plugin's configuration is sane
|
|
func (c *CNIConfig) validatePlugin(ctx context.Context, pluginName, expectedVersion string) error {
|
|
c.ensureExec()
|
|
pluginPath, err := c.exec.FindInPath(pluginName, c.Path)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if expectedVersion == "" {
|
|
expectedVersion = "0.1.0"
|
|
}
|
|
|
|
vi, err := invoke.GetVersionInfo(ctx, pluginPath, c.exec)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
for _, vers := range vi.SupportedVersions() {
|
|
if vers == expectedVersion {
|
|
return nil
|
|
}
|
|
}
|
|
return fmt.Errorf("plugin %s does not support config version %q", pluginName, expectedVersion)
|
|
}
|
|
|
|
// GetVersionInfo reports which versions of the CNI spec are supported by
|
|
// the given plugin.
|
|
func (c *CNIConfig) GetVersionInfo(ctx context.Context, pluginType string) (version.PluginInfo, error) {
|
|
c.ensureExec()
|
|
pluginPath, err := c.exec.FindInPath(pluginType, c.Path)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return invoke.GetVersionInfo(ctx, pluginPath, c.exec)
|
|
}
|
|
|
|
// =====
|
|
func (c *CNIConfig) args(action string, rt *RuntimeConf) *invoke.Args {
|
|
return &invoke.Args{
|
|
Command: action,
|
|
ContainerID: rt.ContainerID,
|
|
NetNS: rt.NetNS,
|
|
PluginArgs: rt.Args,
|
|
IfName: rt.IfName,
|
|
Path: strings.Join(c.Path, string(os.PathListSeparator)),
|
|
}
|
|
}
|