Skip to content

Always use cni unless running with dockershim #14780

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 3 commits into from
Jun 14, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
27 changes: 17 additions & 10 deletions pkg/minikube/cni/cni.go
Original file line number Diff line number Diff line change
Expand Up @@ -87,7 +87,7 @@ func New(cc *config.ClusterConfig) (Manager, error) {
var err error
switch cc.KubernetesConfig.CNI {
case "", "auto":
cnm = chooseDefault(*cc)
cnm, err = chooseDefault(*cc)
case "false":
cnm = Disabled{cc: *cc}
case "kindnet", "true":
Expand Down Expand Up @@ -117,33 +117,40 @@ func IsDisabled(cc config.ClusterConfig) bool {
return true
}

if chooseDefault(cc).String() == "Disabled" {
def, err := chooseDefault(cc)
if err == nil && def.String() == "Disabled" {
return true
}
return false
}

func chooseDefault(cc config.ClusterConfig) Manager {
func chooseDefault(cc config.ClusterConfig) (Manager, error) {
// For backwards compatibility with older profiles using --enable-default-cni
if cc.KubernetesConfig.EnableDefaultCNI {
klog.Infof("EnableDefaultCNI is true, recommending bridge")
return Bridge{}
return Bridge{}, nil
}

if len(cc.Nodes) > 1 || cc.MultiNodeRequested {
// Enables KindNet CNI in master in multi node cluster, This solves the network problem
// inside pod for multi node clusters. See https://github.com/kubernetes/minikube/issues/9838.
klog.Infof("%d nodes found, recommending kindnet", len(cc.Nodes))
return KindNet{cc: cc}
return KindNet{cc: cc}, nil
}

if cc.KubernetesConfig.ContainerRuntime != constants.Docker {
version, err := util.ParseKubernetesVersion(cc.KubernetesConfig.KubernetesVersion)
if err != nil {
return nil, err
}

if cc.KubernetesConfig.ContainerRuntime != constants.Docker || version.GTE(semver.MustParse("1.24.0-alpha.2")) {
// Always use CNI when running with CRI (without dockershim)
if driver.IsKIC(cc.Driver) {
klog.Infof("%q driver + %q runtime found, recommending kindnet", cc.Driver, cc.KubernetesConfig.ContainerRuntime)
return KindNet{cc: cc}
return KindNet{cc: cc}, nil
}
klog.Infof("%q driver + %q runtime found, recommending bridge", cc.Driver, cc.KubernetesConfig.ContainerRuntime)
return Bridge{cc: cc}
return Bridge{cc: cc}, nil
}

// for docker container runtime and k8s v1.24+ where dockershim and kubenet were removed, we fallback to bridge cni for cri-docker(d)
Expand All @@ -155,11 +162,11 @@ func chooseDefault(cc config.ClusterConfig) Manager {
kv, err := util.ParseKubernetesVersion(cc.KubernetesConfig.KubernetesVersion)
if err == nil && kv.GTE(semver.MustParse("1.24.0-alpha.2")) {
klog.Infof("%q driver + %q container runtime found on kubernetes v1.24+, recommending bridge", cc.Driver, cc.KubernetesConfig.ContainerRuntime)
return Bridge{cc: cc}
return Bridge{cc: cc}, nil
}

klog.Infof("CNI unnecessary in this configuration, recommending no CNI")
return Disabled{cc: cc}
return Disabled{cc: cc}, nil
}

// manifestPath returns the path to the CNI manifest
Expand Down
1 change: 1 addition & 0 deletions site/content/en/docs/drivers/includes/none_usage.inc
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,7 @@ This VM must also meet the [kubeadm requirements](https://kubernetes.io/docs/set
* iptables (in legacy mode)
* conntrack
* crictl
* cni-plugins
* SELinux permissive
* cgroups v1 (v2 is not yet supported by Kubernetes)
Expand Down
1 change: 1 addition & 0 deletions site/content/en/docs/drivers/includes/ssh_usage.inc
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,7 @@ This VM must also meet the [kubeadm requirements](https://kubernetes.io/docs/set
* iptables (in legacy mode)
* conntrack
* crictl
* cni-plugins
* SELinux permissive
* cgroups v1 (v2 is not yet supported by Kubernetes)
Expand Down
20 changes: 18 additions & 2 deletions test/integration/net_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -31,6 +31,7 @@ import (
"github.com/blang/semver/v4"
"k8s.io/minikube/pkg/kapi"
"k8s.io/minikube/pkg/minikube/config"
"k8s.io/minikube/pkg/minikube/constants"
"k8s.io/minikube/pkg/minikube/reason"
"k8s.io/minikube/pkg/util"
"k8s.io/minikube/pkg/util/retry"
Expand All @@ -57,7 +58,8 @@ func TestNetworkPlugins(t *testing.T) {
namespace string
hairpin bool
}{
{"auto", []string{}, "", "", "", true},
// kindnet CNI is used by default and hairpin is enabled
{"auto", []string{}, "", "", "", usingCNI()},
{"kubenet", []string{"--network-plugin=kubenet"}, "kubenet", "", "", true},
{"bridge", []string{"--cni=bridge"}, "cni", "", "", true},
{"enable-default-cni", []string{"--enable-default-cni=true"}, "cni", "", "", true},
Expand Down Expand Up @@ -88,7 +90,6 @@ func TestNetworkPlugins(t *testing.T) {

if ContainerRuntime() != "docker" && tc.name == "kubenet" {
// CNI is disabled when --network-plugin=kubenet option is passed. See cni.New(..) function
// But for containerd/crio CNI has to be configured
t.Skipf("Skipping the test as %s container runtimes requires CNI", ContainerRuntime())
}

Expand Down Expand Up @@ -212,6 +213,21 @@ func TestNetworkPlugins(t *testing.T) {
})
}

// usingCNI checks if not using dockershim
func usingCNI() bool {
if ContainerRuntime() != "docker" {
return true
}
version, err := util.ParseKubernetesVersion(constants.DefaultKubernetesVersion)
if err != nil {
return false
}
if version.GTE(semver.MustParse("1.24.0-alpha.2")) {
return true
}
return false
}

// validateFalseCNI checks that minikube returns and error
// if container runtime is "containerd" or "crio"
// and --cni=false
Expand Down