mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-10-30 21:30:16 +00:00 
			
		
		
		
	As the final step, add the `dockerless` tags to all files in the dockershim. Using `-tags=dockerless` in `go build`, we can compile kubelet without the dockershim. Once cadvisor no longer depends on `docker/docker`, compiling with `-tags=dockerless` should be sufficient to compile the Kubelet w/o a dependency on `docker/docker`.
		
			
				
	
	
		
			352 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			352 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // +build linux,!dockerless
 | |
| 
 | |
| /*
 | |
| Copyright 2014 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package cni
 | |
| 
 | |
| import (
 | |
| 	"bytes"
 | |
| 	"encoding/json"
 | |
| 	"fmt"
 | |
| 	"io/ioutil"
 | |
| 	"math/rand"
 | |
| 	"net"
 | |
| 	"os"
 | |
| 	"path"
 | |
| 	"reflect"
 | |
| 	"testing"
 | |
| 	"text/template"
 | |
| 
 | |
| 	types020 "github.com/containernetworking/cni/pkg/types/020"
 | |
| 	"github.com/stretchr/testify/mock"
 | |
| 	"github.com/stretchr/testify/require"
 | |
| 	"k8s.io/api/core/v1"
 | |
| 	clientset "k8s.io/client-go/kubernetes"
 | |
| 	utiltesting "k8s.io/client-go/util/testing"
 | |
| 	kubeletconfig "k8s.io/kubernetes/pkg/kubelet/apis/config"
 | |
| 	kubecontainer "k8s.io/kubernetes/pkg/kubelet/container"
 | |
| 	containertest "k8s.io/kubernetes/pkg/kubelet/container/testing"
 | |
| 	"k8s.io/kubernetes/pkg/kubelet/dockershim/network"
 | |
| 	"k8s.io/kubernetes/pkg/kubelet/dockershim/network/cni/testing"
 | |
| 	"k8s.io/kubernetes/pkg/kubelet/dockershim/network/hostport"
 | |
| 	networktest "k8s.io/kubernetes/pkg/kubelet/dockershim/network/testing"
 | |
| 	"k8s.io/utils/exec"
 | |
| 	fakeexec "k8s.io/utils/exec/testing"
 | |
| )
 | |
| 
 | |
| // Returns .in file path, .out file path, and .env file path
 | |
| func installPluginUnderTest(t *testing.T, testBinDir, testConfDir, testDataDir, binName string, confName, podIP string) (string, string, string) {
 | |
| 	for _, dir := range []string{testBinDir, testConfDir, testDataDir} {
 | |
| 		err := os.MkdirAll(dir, 0777)
 | |
| 		if err != nil {
 | |
| 			t.Fatalf("Failed to create test plugin dir %s: %v", dir, err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	const cniVersion = "0.2.0"
 | |
| 
 | |
| 	confFile := path.Join(testConfDir, confName+".conf")
 | |
| 	f, err := os.Create(confFile)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Failed to install plugin %s: %v", confFile, err)
 | |
| 	}
 | |
| 	networkConfig := fmt.Sprintf(`{ "cniVersion": "%s", "name": "%s", "type": "%s", "capabilities": {"portMappings": true, "bandwidth": true, "ipRanges": true}  }`, cniVersion, confName, binName)
 | |
| 	_, err = f.WriteString(networkConfig)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Failed to write network config file (%v)", err)
 | |
| 	}
 | |
| 	f.Close()
 | |
| 
 | |
| 	pluginExec := path.Join(testBinDir, binName)
 | |
| 	f, err = os.Create(pluginExec)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	// TODO: use mock instead of fake shell script plugin
 | |
| 	const execScriptTempl = `#!/usr/bin/env bash
 | |
| echo -n "{ \"cniVersion\": \"{{.CNIVersion}}\", \"ip4\": { \"ip\": \"{{.PodIP}}/24\" } }"
 | |
| if [ "$CNI_COMMAND" = "VERSION" ]; then
 | |
| 	exit
 | |
| fi
 | |
| cat > {{.InputFile}}
 | |
| env > {{.OutputEnv}}
 | |
| echo "%@" >> {{.OutputEnv}}
 | |
| export $(echo ${CNI_ARGS} | sed 's/;/ /g') &> /dev/null
 | |
| mkdir -p {{.OutputDir}} &> /dev/null
 | |
| echo -n "$CNI_COMMAND $CNI_NETNS $K8S_POD_NAMESPACE $K8S_POD_NAME $K8S_POD_INFRA_CONTAINER_ID" >& {{.OutputFile}}`
 | |
| 
 | |
| 	inputFile := path.Join(testDataDir, binName+".in")
 | |
| 	outputFile := path.Join(testDataDir, binName+".out")
 | |
| 	envFile := path.Join(testDataDir, binName+".env")
 | |
| 	execTemplateData := &map[string]interface{}{
 | |
| 		"InputFile":  inputFile,
 | |
| 		"OutputFile": outputFile,
 | |
| 		"OutputEnv":  envFile,
 | |
| 		"OutputDir":  testDataDir,
 | |
| 		"CNIVersion": cniVersion,
 | |
| 		"PodIP":      podIP,
 | |
| 	}
 | |
| 
 | |
| 	tObj := template.Must(template.New("test").Parse(execScriptTempl))
 | |
| 	buf := &bytes.Buffer{}
 | |
| 	if err := tObj.Execute(buf, *execTemplateData); err != nil {
 | |
| 		t.Fatalf("Error in executing script template - %v", err)
 | |
| 	}
 | |
| 	execScript := buf.String()
 | |
| 	_, err = f.WriteString(execScript)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Failed to write plugin exec - %v", err)
 | |
| 	}
 | |
| 
 | |
| 	err = f.Chmod(0777)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Failed to set exec perms on plugin")
 | |
| 	}
 | |
| 
 | |
| 	f.Close()
 | |
| 
 | |
| 	return inputFile, outputFile, envFile
 | |
| }
 | |
| 
 | |
| func tearDownPlugin(tmpDir string) {
 | |
| 	err := os.RemoveAll(tmpDir)
 | |
| 	if err != nil {
 | |
| 		fmt.Printf("Error in cleaning up test: %v", err)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| type FakeNetworkHost struct {
 | |
| 	networktest.FakePortMappingGetter
 | |
| 	kubeClient clientset.Interface
 | |
| 	pods       []*containertest.FakePod
 | |
| }
 | |
| 
 | |
| func NewFakeHost(kubeClient clientset.Interface, pods []*containertest.FakePod, ports map[string][]*hostport.PortMapping) *FakeNetworkHost {
 | |
| 	host := &FakeNetworkHost{
 | |
| 		networktest.FakePortMappingGetter{PortMaps: ports},
 | |
| 		kubeClient,
 | |
| 		pods,
 | |
| 	}
 | |
| 	return host
 | |
| }
 | |
| 
 | |
| func (fnh *FakeNetworkHost) GetPodByName(name, namespace string) (*v1.Pod, bool) {
 | |
| 	return nil, false
 | |
| }
 | |
| 
 | |
| func (fnh *FakeNetworkHost) GetKubeClient() clientset.Interface {
 | |
| 	return fnh.kubeClient
 | |
| }
 | |
| 
 | |
| func (fnh *FakeNetworkHost) GetNetNS(containerID string) (string, error) {
 | |
| 	for _, fp := range fnh.pods {
 | |
| 		for _, c := range fp.Pod.Containers {
 | |
| 			if c.ID.ID == containerID {
 | |
| 				return fp.NetnsPath, nil
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 	return "", fmt.Errorf("container %q not found", containerID)
 | |
| }
 | |
| 
 | |
| func (fnh *FakeNetworkHost) SupportsLegacyFeatures() bool {
 | |
| 	return true
 | |
| }
 | |
| 
 | |
| func TestCNIPlugin(t *testing.T) {
 | |
| 	// install some random plugin
 | |
| 	netName := fmt.Sprintf("test%d", rand.Intn(1000))
 | |
| 	binName := fmt.Sprintf("test_vendor%d", rand.Intn(1000))
 | |
| 
 | |
| 	podIP := "10.0.0.2"
 | |
| 	podIPOutput := fmt.Sprintf("4: eth0    inet %s/24 scope global dynamic eth0\\       valid_lft forever preferred_lft forever", podIP)
 | |
| 	fakeCmds := []fakeexec.FakeCommandAction{
 | |
| 		func(cmd string, args ...string) exec.Cmd {
 | |
| 			return fakeexec.InitFakeCmd(&fakeexec.FakeCmd{
 | |
| 				CombinedOutputScript: []fakeexec.FakeAction{
 | |
| 					func() ([]byte, []byte, error) {
 | |
| 						return []byte(podIPOutput), nil, nil
 | |
| 					},
 | |
| 				},
 | |
| 			}, cmd, args...)
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	fexec := &fakeexec.FakeExec{
 | |
| 		CommandScript: fakeCmds,
 | |
| 		LookPathFunc: func(file string) (string, error) {
 | |
| 			return fmt.Sprintf("/fake-bin/%s", file), nil
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	mockLoCNI := &mock_cni.MockCNI{}
 | |
| 	// TODO mock for the test plugin too
 | |
| 
 | |
| 	tmpDir := utiltesting.MkTmpdirOrDie("cni-test")
 | |
| 	testConfDir := path.Join(tmpDir, "etc", "cni", "net.d")
 | |
| 	testBinDir := path.Join(tmpDir, "opt", "cni", "bin")
 | |
| 	testDataDir := path.Join(tmpDir, "output")
 | |
| 	testCacheDir := path.Join(tmpDir, "var", "lib", "cni", "cache")
 | |
| 	defer tearDownPlugin(tmpDir)
 | |
| 	inputFile, outputFile, outputEnv := installPluginUnderTest(t, testBinDir, testConfDir, testDataDir, binName, netName, podIP)
 | |
| 
 | |
| 	containerID := kubecontainer.ContainerID{Type: "test", ID: "test_infra_container"}
 | |
| 	pods := []*containertest.FakePod{{
 | |
| 		Pod: &kubecontainer.Pod{
 | |
| 			Containers: []*kubecontainer.Container{
 | |
| 				{ID: containerID},
 | |
| 			},
 | |
| 		},
 | |
| 		NetnsPath: "/proc/12345/ns/net",
 | |
| 	}}
 | |
| 
 | |
| 	plugins := ProbeNetworkPlugins(testConfDir, testCacheDir, []string{testBinDir})
 | |
| 	if len(plugins) != 1 {
 | |
| 		t.Fatalf("Expected only one network plugin, got %d", len(plugins))
 | |
| 	}
 | |
| 	if plugins[0].Name() != "cni" {
 | |
| 		t.Fatalf("Expected CNI network plugin, got %q", plugins[0].Name())
 | |
| 	}
 | |
| 
 | |
| 	cniPlugin, ok := plugins[0].(*cniNetworkPlugin)
 | |
| 	if !ok {
 | |
| 		t.Fatalf("Not a CNI network plugin!")
 | |
| 	}
 | |
| 	cniPlugin.execer = fexec
 | |
| 	cniPlugin.loNetwork.CNIConfig = mockLoCNI
 | |
| 
 | |
| 	mockLoCNI.On("AddNetworkList", mock.AnythingOfType("*context.timerCtx"), cniPlugin.loNetwork.NetworkConfig, mock.AnythingOfType("*libcni.RuntimeConf")).Return(&types020.Result{IP4: &types020.IPConfig{IP: net.IPNet{IP: []byte{127, 0, 0, 1}}}}, nil)
 | |
| 	mockLoCNI.On("DelNetworkList", mock.AnythingOfType("*context.timerCtx"), cniPlugin.loNetwork.NetworkConfig, mock.AnythingOfType("*libcni.RuntimeConf")).Return(nil)
 | |
| 
 | |
| 	// Check that status returns an error
 | |
| 	if err := cniPlugin.Status(); err == nil {
 | |
| 		t.Fatalf("cniPlugin returned non-err with no podCidr")
 | |
| 	}
 | |
| 
 | |
| 	cniPlugin.Event(network.NET_PLUGIN_EVENT_POD_CIDR_CHANGE, map[string]interface{}{
 | |
| 		network.NET_PLUGIN_EVENT_POD_CIDR_CHANGE_DETAIL_CIDR: "10.0.2.0/24",
 | |
| 	})
 | |
| 
 | |
| 	if err := cniPlugin.Status(); err != nil {
 | |
| 		t.Fatalf("unexpected status err: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	ports := map[string][]*hostport.PortMapping{
 | |
| 		containerID.ID: {
 | |
| 			{
 | |
| 				Name:          "name",
 | |
| 				HostPort:      8008,
 | |
| 				ContainerPort: 80,
 | |
| 				Protocol:      "UDP",
 | |
| 				HostIP:        "0.0.0.0",
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 	fakeHost := NewFakeHost(nil, pods, ports)
 | |
| 
 | |
| 	plug, err := network.InitNetworkPlugin(plugins, "cni", fakeHost, kubeletconfig.HairpinNone, "10.0.0.0/8", network.UseDefaultMTU)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Failed to select the desired plugin: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	bandwidthAnnotation := make(map[string]string)
 | |
| 	bandwidthAnnotation["kubernetes.io/ingress-bandwidth"] = "1M"
 | |
| 	bandwidthAnnotation["kubernetes.io/egress-bandwidth"] = "1M"
 | |
| 
 | |
| 	// Set up the pod
 | |
| 	err = plug.SetUpPod("podNamespace", "podName", containerID, bandwidthAnnotation, nil)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Expected nil: %v", err)
 | |
| 	}
 | |
| 	eo, eerr := ioutil.ReadFile(outputEnv)
 | |
| 	output, err := ioutil.ReadFile(outputFile)
 | |
| 	if err != nil || eerr != nil {
 | |
| 		t.Errorf("Failed to read output file %s: %v (env %s err %v)", outputFile, err, eo, eerr)
 | |
| 	}
 | |
| 
 | |
| 	expectedOutput := "ADD /proc/12345/ns/net podNamespace podName test_infra_container"
 | |
| 	if string(output) != expectedOutput {
 | |
| 		t.Errorf("Mismatch in expected output for setup hook. Expected '%s', got '%s'", expectedOutput, string(output))
 | |
| 	}
 | |
| 
 | |
| 	// Verify the correct network configuration was passed
 | |
| 	inputConfig := struct {
 | |
| 		RuntimeConfig struct {
 | |
| 			PortMappings []map[string]interface{}   `json:"portMappings"`
 | |
| 			Bandwidth    map[string]interface{}     `json:"bandwidth"`
 | |
| 			IPRanges     [][]map[string]interface{} `json:"IPRanges"`
 | |
| 		} `json:"runtimeConfig"`
 | |
| 	}{}
 | |
| 	inputBytes, inerr := ioutil.ReadFile(inputFile)
 | |
| 	parseerr := json.Unmarshal(inputBytes, &inputConfig)
 | |
| 	if inerr != nil || parseerr != nil {
 | |
| 		t.Errorf("failed to parse reported cni input config %s: (%v %v)", inputFile, inerr, parseerr)
 | |
| 	}
 | |
| 	expectedMappings := []map[string]interface{}{
 | |
| 		// hah, golang always unmarshals unstructured json numbers as float64
 | |
| 		{"hostPort": 8008.0, "containerPort": 80.0, "protocol": "udp", "hostIP": "0.0.0.0"},
 | |
| 	}
 | |
| 	if !reflect.DeepEqual(inputConfig.RuntimeConfig.PortMappings, expectedMappings) {
 | |
| 		t.Errorf("mismatch in expected port mappings. expected %v got %v", expectedMappings, inputConfig.RuntimeConfig.PortMappings)
 | |
| 	}
 | |
| 	expectedBandwidth := map[string]interface{}{
 | |
| 		"ingressRate": 1000000.0, "egressRate": 1000000.0,
 | |
| 		"ingressBurst": 2147483647.0, "egressBurst": 2147483647.0,
 | |
| 	}
 | |
| 	if !reflect.DeepEqual(inputConfig.RuntimeConfig.Bandwidth, expectedBandwidth) {
 | |
| 		t.Errorf("mismatch in expected bandwidth. expected %v got %v", expectedBandwidth, inputConfig.RuntimeConfig.Bandwidth)
 | |
| 	}
 | |
| 
 | |
| 	expectedIPRange := [][]map[string]interface{}{
 | |
| 		{
 | |
| 			{"subnet": "10.0.2.0/24"},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	if !reflect.DeepEqual(inputConfig.RuntimeConfig.IPRanges, expectedIPRange) {
 | |
| 		t.Errorf("mismatch in expected ipRange. expected %v got %v", expectedIPRange, inputConfig.RuntimeConfig.IPRanges)
 | |
| 	}
 | |
| 
 | |
| 	// Get its IP address
 | |
| 	status, err := plug.GetPodNetworkStatus("podNamespace", "podName", containerID)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Failed to read pod network status: %v", err)
 | |
| 	}
 | |
| 	if status.IP.String() != podIP {
 | |
| 		t.Errorf("Expected pod IP %q but got %q", podIP, status.IP.String())
 | |
| 	}
 | |
| 
 | |
| 	// Tear it down
 | |
| 	err = plug.TearDownPod("podNamespace", "podName", containerID)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Expected nil: %v", err)
 | |
| 	}
 | |
| 	output, err = ioutil.ReadFile(outputFile)
 | |
| 	require.NoError(t, err)
 | |
| 	expectedOutput = "DEL /proc/12345/ns/net podNamespace podName test_infra_container"
 | |
| 	if string(output) != expectedOutput {
 | |
| 		t.Errorf("Mismatch in expected output for setup hook. Expected '%s', got '%s'", expectedOutput, string(output))
 | |
| 	}
 | |
| 
 | |
| 	mockLoCNI.AssertExpectations(t)
 | |
| }
 | |
| 
 | |
| func TestLoNetNonNil(t *testing.T) {
 | |
| 	if conf := getLoNetwork(nil); conf == nil {
 | |
| 		t.Error("Expected non-nil lo network")
 | |
| 	}
 | |
| }
 |