417 lines
10 KiB
Go
417 lines
10 KiB
Go
// Copyright 2015 CNI authors
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package main
|
|
|
|
import (
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"runtime"
|
|
|
|
"github.com/vishvananda/netlink"
|
|
|
|
"github.com/containernetworking/cni/pkg/skel"
|
|
"github.com/containernetworking/cni/pkg/types"
|
|
current "github.com/containernetworking/cni/pkg/types/100"
|
|
"github.com/containernetworking/cni/pkg/version"
|
|
"github.com/containernetworking/plugins/pkg/ip"
|
|
"github.com/containernetworking/plugins/pkg/ipam"
|
|
"github.com/containernetworking/plugins/pkg/ns"
|
|
bv "github.com/containernetworking/plugins/pkg/utils/buildversion"
|
|
)
|
|
|
|
type NetConf struct {
|
|
types.NetConf
|
|
Master string `json:"master"`
|
|
VlanID int `json:"vlanId"`
|
|
MTU int `json:"mtu,omitempty"`
|
|
LinkContNs bool `json:"linkInContainer,omitempty"`
|
|
}
|
|
|
|
func init() {
|
|
// this ensures that main runs only on main thread (thread group leader).
|
|
// since namespace ops (unshare, setns) are done for a single thread, we
|
|
// must ensure that the goroutine does not jump from OS thread to thread
|
|
runtime.LockOSThread()
|
|
}
|
|
|
|
func loadConf(args *skel.CmdArgs) (*NetConf, string, error) {
|
|
n := &NetConf{}
|
|
if err := json.Unmarshal(args.StdinData, n); err != nil {
|
|
return nil, "", fmt.Errorf("failed to load netconf: %v", err)
|
|
}
|
|
if n.Master == "" {
|
|
return nil, "", fmt.Errorf("\"master\" field is required. It specifies the host interface name to create the VLAN for")
|
|
}
|
|
if n.VlanID < 0 || n.VlanID > 4094 {
|
|
return nil, "", fmt.Errorf("invalid VLAN ID %d (must be between 0 and 4095 inclusive)", n.VlanID)
|
|
}
|
|
|
|
// check existing and MTU of master interface
|
|
masterMTU, err := getMTUByName(n.Master, args.Netns, n.LinkContNs)
|
|
if err != nil {
|
|
return nil, "", err
|
|
}
|
|
if n.MTU < 0 || n.MTU > masterMTU {
|
|
return nil, "", fmt.Errorf("invalid MTU %d, must be [0, master MTU(%d)]", n.MTU, masterMTU)
|
|
}
|
|
return n, n.CNIVersion, nil
|
|
}
|
|
|
|
func getMTUByName(ifName string, namespace string, inContainer bool) (int, error) {
|
|
var link netlink.Link
|
|
var err error
|
|
if inContainer {
|
|
var netns ns.NetNS
|
|
netns, err = ns.GetNS(namespace)
|
|
if err != nil {
|
|
return 0, fmt.Errorf("failed to open netns %q: %v", netns, err)
|
|
}
|
|
defer netns.Close()
|
|
|
|
err = netns.Do(func(_ ns.NetNS) error {
|
|
link, err = netlink.LinkByName(ifName)
|
|
return err
|
|
})
|
|
} else {
|
|
link, err = netlink.LinkByName(ifName)
|
|
}
|
|
if err != nil {
|
|
return 0, err
|
|
}
|
|
return link.Attrs().MTU, nil
|
|
}
|
|
|
|
func createVlan(conf *NetConf, ifName string, netns ns.NetNS) (*current.Interface, error) {
|
|
vlan := ¤t.Interface{}
|
|
|
|
var m netlink.Link
|
|
var err error
|
|
if conf.LinkContNs {
|
|
err = netns.Do(func(_ ns.NetNS) error {
|
|
m, err = netlink.LinkByName(conf.Master)
|
|
return err
|
|
})
|
|
} else {
|
|
m, err = netlink.LinkByName(conf.Master)
|
|
}
|
|
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to lookup master %q: %v", conf.Master, err)
|
|
}
|
|
|
|
// due to kernel bug we have to create with tmpname or it might
|
|
// collide with the name on the host and error out
|
|
tmpName, err := ip.RandomVethName()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
linkAttrs := netlink.NewLinkAttrs()
|
|
linkAttrs.MTU = conf.MTU
|
|
linkAttrs.Name = tmpName
|
|
linkAttrs.ParentIndex = m.Attrs().Index
|
|
linkAttrs.Namespace = netlink.NsFd(int(netns.Fd()))
|
|
|
|
v := &netlink.Vlan{
|
|
LinkAttrs: linkAttrs,
|
|
VlanId: conf.VlanID,
|
|
}
|
|
|
|
if conf.LinkContNs {
|
|
err = netns.Do(func(_ ns.NetNS) error {
|
|
return netlink.LinkAdd(v)
|
|
})
|
|
} else {
|
|
err = netlink.LinkAdd(v)
|
|
}
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to create vlan: %v", err)
|
|
}
|
|
|
|
err = netns.Do(func(_ ns.NetNS) error {
|
|
err := ip.RenameLink(tmpName, ifName)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to rename vlan to %q: %v", ifName, err)
|
|
}
|
|
vlan.Name = ifName
|
|
|
|
// Re-fetch interface to get all properties/attributes
|
|
contVlan, err := netlink.LinkByName(vlan.Name)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to refetch vlan %q: %v", vlan.Name, err)
|
|
}
|
|
vlan.Mac = contVlan.Attrs().HardwareAddr.String()
|
|
vlan.Sandbox = netns.Path()
|
|
|
|
return nil
|
|
})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return vlan, nil
|
|
}
|
|
|
|
func cmdAdd(args *skel.CmdArgs) error {
|
|
n, cniVersion, err := loadConf(args)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
netns, err := ns.GetNS(args.Netns)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to open netns %q: %v", args.Netns, err)
|
|
}
|
|
defer netns.Close()
|
|
|
|
vlanInterface, err := createVlan(n, args.IfName, netns)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// run the IPAM plugin and get back the config to apply
|
|
r, err := ipam.ExecAdd(n.IPAM.Type, args.StdinData)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to execute IPAM delegate: %v", err)
|
|
}
|
|
|
|
// Invoke ipam del if err to avoid ip leak
|
|
defer func() {
|
|
if err != nil {
|
|
ipam.ExecDel(n.IPAM.Type, args.StdinData)
|
|
}
|
|
}()
|
|
|
|
// Convert whatever the IPAM result was into the current Result type
|
|
result, err := current.NewResultFromResult(r)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if len(result.IPs) == 0 {
|
|
return errors.New("IPAM plugin returned missing IP config")
|
|
}
|
|
for _, ipc := range result.IPs {
|
|
// All addresses belong to the vlan interface
|
|
ipc.Interface = current.Int(0)
|
|
}
|
|
|
|
result.Interfaces = []*current.Interface{vlanInterface}
|
|
|
|
err = netns.Do(func(_ ns.NetNS) error {
|
|
return ipam.ConfigureIface(args.IfName, result)
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
result.DNS = n.DNS
|
|
|
|
return types.PrintResult(result, cniVersion)
|
|
}
|
|
|
|
func cmdDel(args *skel.CmdArgs) error {
|
|
n, _, err := loadConf(args)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = ipam.ExecDel(n.IPAM.Type, args.StdinData)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if args.Netns == "" {
|
|
return nil
|
|
}
|
|
|
|
err = ns.WithNetNSPath(args.Netns, func(_ ns.NetNS) error {
|
|
err = ip.DelLinkByName(args.IfName)
|
|
if err != nil && err == ip.ErrLinkNotFound {
|
|
return nil
|
|
}
|
|
return err
|
|
})
|
|
if err != nil {
|
|
// if NetNs is passed down by the Cloud Orchestration Engine, or if it called multiple times
|
|
// so don't return an error if the device is already removed.
|
|
// https://github.com/kubernetes/kubernetes/issues/43014#issuecomment-287164444
|
|
_, ok := err.(ns.NSPathNotExistErr)
|
|
if ok {
|
|
return nil
|
|
}
|
|
return err
|
|
}
|
|
|
|
return err
|
|
}
|
|
|
|
func main() {
|
|
skel.PluginMainFuncs(skel.CNIFuncs{
|
|
Add: cmdAdd,
|
|
Check: cmdCheck,
|
|
Del: cmdDel,
|
|
Status: cmdStatus,
|
|
/* FIXME GC */
|
|
}, version.All, bv.BuildString("vlan"))
|
|
}
|
|
|
|
func cmdCheck(args *skel.CmdArgs) error {
|
|
conf := NetConf{}
|
|
if err := json.Unmarshal(args.StdinData, &conf); err != nil {
|
|
return fmt.Errorf("failed to load netconf: %v", err)
|
|
}
|
|
|
|
netns, err := ns.GetNS(args.Netns)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to open netns %q: %v", args.Netns, err)
|
|
}
|
|
defer netns.Close()
|
|
|
|
// run the IPAM plugin and get back the config to apply
|
|
err = ipam.ExecCheck(conf.IPAM.Type, args.StdinData)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if conf.NetConf.RawPrevResult == nil {
|
|
return fmt.Errorf("vlan: Required prevResult missing")
|
|
}
|
|
if err := version.ParsePrevResult(&conf.NetConf); err != nil {
|
|
return err
|
|
}
|
|
// Convert whatever the IPAM result was into the current Result type
|
|
result, err := current.NewResultFromResult(conf.PrevResult)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
var contMap current.Interface
|
|
// Find interfaces for name whe know, that of host-device inside container
|
|
for _, intf := range result.Interfaces {
|
|
if args.IfName == intf.Name {
|
|
if args.Netns == intf.Sandbox {
|
|
contMap = *intf
|
|
continue
|
|
}
|
|
}
|
|
}
|
|
|
|
// The namespace must be the same as what was configured
|
|
if args.Netns != contMap.Sandbox {
|
|
return fmt.Errorf("Sandbox in prevResult %s doesn't match configured netns: %s",
|
|
contMap.Sandbox, args.Netns)
|
|
}
|
|
|
|
if conf.LinkContNs {
|
|
err = netns.Do(func(_ ns.NetNS) error {
|
|
_, err = netlink.LinkByName(conf.Master)
|
|
return err
|
|
})
|
|
} else {
|
|
_, err = netlink.LinkByName(conf.Master)
|
|
}
|
|
|
|
if err != nil {
|
|
return fmt.Errorf("failed to lookup master %q: %v", conf.Master, err)
|
|
}
|
|
|
|
//
|
|
// Check prevResults for ips, routes and dns against values found in the container
|
|
if err := netns.Do(func(_ ns.NetNS) error {
|
|
// Check interface against values found in the container
|
|
err := validateCniContainerInterface(contMap, conf.VlanID, conf.MTU)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = ip.ValidateExpectedInterfaceIPs(args.IfName, result.IPs)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = ip.ValidateExpectedRoute(result.Routes)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func validateCniContainerInterface(intf current.Interface, vlanID int, mtu int) error {
|
|
var link netlink.Link
|
|
var err error
|
|
|
|
if intf.Name == "" {
|
|
return fmt.Errorf("Container interface name missing in prevResult: %v", intf.Name)
|
|
}
|
|
link, err = netlink.LinkByName(intf.Name)
|
|
if err != nil {
|
|
return fmt.Errorf("vlan: Container Interface name in prevResult: %s not found", intf.Name)
|
|
}
|
|
if intf.Sandbox == "" {
|
|
return fmt.Errorf("vlan: Error: Container interface %s should not be in host namespace", link.Attrs().Name)
|
|
}
|
|
|
|
vlan, isVlan := link.(*netlink.Vlan)
|
|
if !isVlan {
|
|
return fmt.Errorf("Error: Container interface %s not of type vlan", link.Attrs().Name)
|
|
}
|
|
|
|
// TODO This works when unit testing via cnitool; fails with ./test.sh
|
|
// if masterIndex != vlan.Attrs().ParentIndex {
|
|
// return fmt.Errorf("Container vlan Master %d does not match expected value: %d", vlan.Attrs().ParentIndex, masterIndex)
|
|
//}
|
|
|
|
if intf.Mac != "" {
|
|
if intf.Mac != link.Attrs().HardwareAddr.String() {
|
|
return fmt.Errorf("vlan: Interface %s Mac %s doesn't match container Mac: %s", intf.Name, intf.Mac, link.Attrs().HardwareAddr)
|
|
}
|
|
}
|
|
|
|
if vlanID != vlan.VlanId {
|
|
return fmt.Errorf("Error: Tuning link %s configured promisc is %v, current value is %d",
|
|
intf.Name, vlanID, vlan.VlanId)
|
|
}
|
|
|
|
if mtu != 0 {
|
|
if mtu != link.Attrs().MTU {
|
|
return fmt.Errorf("Error: Tuning configured MTU of %s is %d, current value is %d",
|
|
intf.Name, mtu, link.Attrs().MTU)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func cmdStatus(args *skel.CmdArgs) error {
|
|
conf := NetConf{}
|
|
if err := json.Unmarshal(args.StdinData, &conf); err != nil {
|
|
return fmt.Errorf("failed to load netconf: %w", err)
|
|
}
|
|
|
|
if err := ipam.ExecStatus(conf.IPAM.Type, args.StdinData); err != nil {
|
|
return err
|
|
}
|
|
|
|
// TODO: Check if master interface exists.
|
|
|
|
return nil
|
|
}
|