mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-11-04 07:49:35 +00:00 
			
		
		
		
	Inject container manager into Kubelet. This lets us stub out container manager during integration testing.
		
			
				
	
	
		
			111 lines
		
	
	
		
			3.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			111 lines
		
	
	
		
			3.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2014 The Kubernetes Authors All rights reserved.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package kubelet
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
 | 
						|
	"k8s.io/kubernetes/pkg/api"
 | 
						|
	"k8s.io/kubernetes/pkg/capabilities"
 | 
						|
	kubetypes "k8s.io/kubernetes/pkg/kubelet/types"
 | 
						|
	"k8s.io/kubernetes/pkg/securitycontext"
 | 
						|
)
 | 
						|
 | 
						|
// Check whether we have the capabilities to run the specified pod.
 | 
						|
func canRunPod(pod *api.Pod) error {
 | 
						|
	if pod.Spec.SecurityContext != nil && pod.Spec.SecurityContext.HostNetwork {
 | 
						|
		allowed, err := allowHostNetwork(pod)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		if !allowed {
 | 
						|
			return fmt.Errorf("pod with UID %q specified host networking, but is disallowed", pod.UID)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if pod.Spec.SecurityContext != nil && pod.Spec.SecurityContext.HostPID {
 | 
						|
		allowed, err := allowHostPID(pod)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		if !allowed {
 | 
						|
			return fmt.Errorf("pod with UID %q specified host PID, but is disallowed", pod.UID)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if pod.Spec.SecurityContext != nil && pod.Spec.SecurityContext.HostIPC {
 | 
						|
		allowed, err := allowHostIPC(pod)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		if !allowed {
 | 
						|
			return fmt.Errorf("pod with UID %q specified host ipc, but is disallowed", pod.UID)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if !capabilities.Get().AllowPrivileged {
 | 
						|
		for _, container := range pod.Spec.Containers {
 | 
						|
			if securitycontext.HasPrivilegedRequest(&container) {
 | 
						|
				return fmt.Errorf("pod with UID %q specified privileged container, but is disallowed", pod.UID)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// Determined whether the specified pod is allowed to use host networking
 | 
						|
func allowHostNetwork(pod *api.Pod) (bool, error) {
 | 
						|
	podSource, err := kubetypes.GetPodSource(pod)
 | 
						|
	if err != nil {
 | 
						|
		return false, err
 | 
						|
	}
 | 
						|
	for _, source := range capabilities.Get().PrivilegedSources.HostNetworkSources {
 | 
						|
		if source == podSource {
 | 
						|
			return true, nil
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return false, nil
 | 
						|
}
 | 
						|
 | 
						|
// Determined whether the specified pod is allowed to use host networking
 | 
						|
func allowHostPID(pod *api.Pod) (bool, error) {
 | 
						|
	podSource, err := kubetypes.GetPodSource(pod)
 | 
						|
	if err != nil {
 | 
						|
		return false, err
 | 
						|
	}
 | 
						|
	for _, source := range capabilities.Get().PrivilegedSources.HostPIDSources {
 | 
						|
		if source == podSource {
 | 
						|
			return true, nil
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return false, nil
 | 
						|
}
 | 
						|
 | 
						|
// Determined whether the specified pod is allowed to use host ipc
 | 
						|
func allowHostIPC(pod *api.Pod) (bool, error) {
 | 
						|
	podSource, err := kubetypes.GetPodSource(pod)
 | 
						|
	if err != nil {
 | 
						|
		return false, err
 | 
						|
	}
 | 
						|
	for _, source := range capabilities.Get().PrivilegedSources.HostIPCSources {
 | 
						|
		if source == podSource {
 | 
						|
			return true, nil
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return false, nil
 | 
						|
}
 |