123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250 |
- /*
- Copyright 2016 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package dockershim
- import (
- "fmt"
- "math/rand"
- "strconv"
- "strings"
- dockertypes "github.com/docker/engine-api/types"
- dockerfilters "github.com/docker/engine-api/types/filters"
- dockerapiversion "github.com/docker/engine-api/types/versions"
- dockernat "github.com/docker/go-connections/nat"
- "github.com/golang/glog"
- runtimeApi "k8s.io/kubernetes/pkg/kubelet/api/v1alpha1/runtime"
- )
- const (
- // kubePrefix is used to identify the containers/sandboxes on the node managed by kubelet
- kubePrefix = "k8s"
- // kubeSandboxNamePrefix is used to keep sandbox name consistent with old podInfraContainer name
- kubeSandboxNamePrefix = "POD"
- )
- // apiVersion implements kubecontainer.Version interface by implementing
- // Compare() and String(). It uses the compare function of engine-api to
- // compare docker apiversions.
- type apiVersion string
- func (v apiVersion) String() string {
- return string(v)
- }
- func (v apiVersion) Compare(other string) (int, error) {
- if dockerapiversion.LessThan(string(v), other) {
- return -1, nil
- } else if dockerapiversion.GreaterThan(string(v), other) {
- return 1, nil
- }
- return 0, nil
- }
- // generateEnvList converts KeyValue list to a list of strings, in the form of
- // '<key>=<value>', which can be understood by docker.
- func generateEnvList(envs []*runtimeApi.KeyValue) (result []string) {
- for _, env := range envs {
- result = append(result, fmt.Sprintf("%s=%s", env.GetKey(), env.GetValue()))
- }
- return
- }
- // Merge annotations and labels because docker supports only labels.
- // TODO: Need to be able to distinguish annotations from labels; otherwise, we
- // couldn't restore the information when reading the labels back from docker.
- func makeLabels(labels, annotations map[string]string) map[string]string {
- merged := make(map[string]string)
- for k, v := range labels {
- merged[k] = v
- }
- for k, v := range annotations {
- if _, ok := merged[k]; !ok {
- // Don't overwrite the key if it already exists.
- merged[k] = v
- }
- }
- return merged
- }
- // generateMountBindings converts the mount list to a list of strings that
- // can be understood by docker.
- // Each element in the string is in the form of:
- // '<HostPath>:<ContainerPath>', or
- // '<HostPath>:<ContainerPath>:ro', if the path is read only, or
- // '<HostPath>:<ContainerPath>:Z', if the volume requires SELinux
- // relabeling and the pod provides an SELinux label
- func generateMountBindings(mounts []*runtimeApi.Mount) (result []string) {
- // TODO: resolve podHasSELinuxLabel
- for _, m := range mounts {
- bind := fmt.Sprintf("%s:%s", m.GetHostPath(), m.GetContainerPath())
- readOnly := m.GetReadonly()
- if readOnly {
- bind += ":ro"
- }
- if m.GetSelinuxRelabel() {
- if readOnly {
- bind += ",Z"
- } else {
- bind += ":Z"
- }
- }
- result = append(result, bind)
- }
- return
- }
- func makePortsAndBindings(pm []*runtimeApi.PortMapping) (map[dockernat.Port]struct{}, map[dockernat.Port][]dockernat.PortBinding) {
- exposedPorts := map[dockernat.Port]struct{}{}
- portBindings := map[dockernat.Port][]dockernat.PortBinding{}
- for _, port := range pm {
- exteriorPort := port.GetHostPort()
- if exteriorPort == 0 {
- // No need to do port binding when HostPort is not specified
- continue
- }
- interiorPort := port.GetContainerPort()
- // Some of this port stuff is under-documented voodoo.
- // See http://stackoverflow.com/questions/20428302/binding-a-port-to-a-host-interface-using-the-rest-api
- var protocol string
- switch strings.ToUpper(string(port.GetProtocol())) {
- case "UDP":
- protocol = "/udp"
- case "TCP":
- protocol = "/tcp"
- default:
- glog.Warningf("Unknown protocol %q: defaulting to TCP", port.Protocol)
- protocol = "/tcp"
- }
- dockerPort := dockernat.Port(strconv.Itoa(int(interiorPort)) + protocol)
- exposedPorts[dockerPort] = struct{}{}
- hostBinding := dockernat.PortBinding{
- HostPort: strconv.Itoa(int(exteriorPort)),
- HostIP: port.GetHostIp(),
- }
- // Allow multiple host ports bind to same docker port
- if existedBindings, ok := portBindings[dockerPort]; ok {
- // If a docker port already map to a host port, just append the host ports
- portBindings[dockerPort] = append(existedBindings, hostBinding)
- } else {
- // Otherwise, it's fresh new port binding
- portBindings[dockerPort] = []dockernat.PortBinding{
- hostBinding,
- }
- }
- }
- return exposedPorts, portBindings
- }
- // TODO: Seccomp support. Need to figure out how to pass seccomp options
- // through the runtime API (annotations?).See dockerManager.getSecurityOpts()
- // for the details. Always set the default seccomp profile for now.
- // Also need to support syntax for different docker versions.
- func getSeccompOpts() string {
- return fmt.Sprintf("%s=%s", "seccomp", defaultSeccompProfile)
- }
- func getNetworkNamespace(c *dockertypes.ContainerJSON) string {
- return fmt.Sprintf(dockerNetNSFmt, c.State.Pid)
- }
- // buildKubeGenericName creates a name which can be reversed to identify container/sandbox name.
- // This function returns the unique name.
- func buildKubeGenericName(sandboxConfig *runtimeApi.PodSandboxConfig, containerName string) string {
- stableName := fmt.Sprintf("%s_%s_%s_%s_%s",
- kubePrefix,
- containerName,
- sandboxConfig.Metadata.GetName(),
- sandboxConfig.Metadata.GetNamespace(),
- sandboxConfig.Metadata.GetUid(),
- )
- UID := fmt.Sprintf("%08x", rand.Uint32())
- return fmt.Sprintf("%s_%s", stableName, UID)
- }
- // buildSandboxName creates a name which can be reversed to identify sandbox full name.
- func buildSandboxName(sandboxConfig *runtimeApi.PodSandboxConfig) string {
- sandboxName := fmt.Sprintf("%s.%d", kubeSandboxNamePrefix, sandboxConfig.Metadata.GetAttempt())
- return buildKubeGenericName(sandboxConfig, sandboxName)
- }
- // parseSandboxName unpacks a sandbox full name, returning the pod name, namespace, uid and attempt.
- func parseSandboxName(name string) (string, string, string, uint32, error) {
- podName, podNamespace, podUID, _, attempt, err := parseContainerName(name)
- if err != nil {
- return "", "", "", 0, err
- }
- return podName, podNamespace, podUID, attempt, nil
- }
- // buildContainerName creates a name which can be reversed to identify container name.
- // This function returns stable name, unique name and an unique id.
- func buildContainerName(sandboxConfig *runtimeApi.PodSandboxConfig, containerConfig *runtimeApi.ContainerConfig) string {
- containerName := fmt.Sprintf("%s.%d", containerConfig.Metadata.GetName(), containerConfig.Metadata.GetAttempt())
- return buildKubeGenericName(sandboxConfig, containerName)
- }
- // parseContainerName unpacks a container name, returning the pod name, namespace, UID,
- // container name and attempt.
- func parseContainerName(name string) (podName, podNamespace, podUID, containerName string, attempt uint32, err error) {
- parts := strings.Split(name, "_")
- if len(parts) == 0 || parts[0] != kubePrefix {
- err = fmt.Errorf("failed to parse container name %q into parts", name)
- return "", "", "", "", 0, err
- }
- if len(parts) < 6 {
- glog.Warningf("Found a container with the %q prefix, but too few fields (%d): %q", kubePrefix, len(parts), name)
- err = fmt.Errorf("container name %q has fewer parts than expected %v", name, parts)
- return "", "", "", "", 0, err
- }
- nameParts := strings.Split(parts[1], ".")
- containerName = nameParts[0]
- if len(nameParts) > 1 {
- attemptNumber, err := strconv.ParseUint(nameParts[1], 10, 32)
- if err != nil {
- glog.Warningf("invalid container attempt %q in container %q", nameParts[1], name)
- }
- attempt = uint32(attemptNumber)
- }
- return parts[2], parts[3], parts[4], containerName, attempt, nil
- }
- // dockerFilter wraps around dockerfilters.Args and provides methods to modify
- // the filter easily.
- type dockerFilter struct {
- f *dockerfilters.Args
- }
- func newDockerFilter(args *dockerfilters.Args) *dockerFilter {
- return &dockerFilter{f: args}
- }
- func (f *dockerFilter) Add(key, value string) {
- f.Add(key, value)
- }
- func (f *dockerFilter) AddLabel(key, value string) {
- f.Add("label", fmt.Sprintf("%s=%s", key, value))
- }
|