@@ -2,6 +2,7 @@ package builder
2
2
3
3
import (
4
4
"bufio"
5
+ "errors"
5
6
"fmt"
6
7
"io"
7
8
"io/ioutil"
@@ -11,6 +12,10 @@ import (
11
12
"strconv"
12
13
"strings"
13
14
15
+ "github.com/google/cadvisor/container/crio"
16
+ crioclient "github.com/kubernetes-incubator/cri-o/client"
17
+ "github.com/kubernetes-incubator/cri-o/pkg/annotations"
18
+
14
19
docker "github.com/fsouza/go-dockerclient"
15
20
16
21
s2iapi "github.com/openshift/source-to-image/pkg/api"
@@ -20,17 +25,22 @@ import (
20
25
21
26
var (
22
27
// procCGroupPattern is a regular expression that parses the entries in /proc/self/cgroup
23
- procCGroupPattern = regexp .MustCompile (`\d+:([a-z_,]+):/.*/(docker -|)([a-z0-9]+).*` )
28
+ procCGroupPattern = regexp .MustCompile (`\d+:([a-z_,]+):/.*/(\w+ -|)([a-z0-9]+).*` )
24
29
)
25
30
26
31
// readNetClsCGroup parses /proc/self/cgroup in order to determine the container id that can be used
27
- // the network namespace that this process is running on.
28
- func readNetClsCGroup (reader io.Reader ) string {
29
- cgroups := make (map [string ]string )
32
+ // the network namespace that this process is running on, it returns the cgroup and container type
33
+ // (docker vs crio).
34
+ func readNetClsCGroup (reader io.Reader ) (string , string ) {
35
+
36
+ containerType := "docker"
30
37
38
+ cgroups := make (map [string ]string )
31
39
scanner := bufio .NewScanner (reader )
32
40
for scanner .Scan () {
33
41
if match := procCGroupPattern .FindStringSubmatch (scanner .Text ()); match != nil {
42
+ containerType = strings .TrimSuffix (match [2 ], "-" )
43
+
34
44
list := strings .Split (match [1 ], "," )
35
45
containerId := match [3 ]
36
46
if len (list ) > 0 {
@@ -46,26 +56,47 @@ func readNetClsCGroup(reader io.Reader) string {
46
56
names := []string {"net_cls" , "cpu" }
47
57
for _ , group := range names {
48
58
if value , ok := cgroups [group ]; ok {
49
- return value
59
+ return value , containerType
50
60
}
51
61
}
52
62
53
- return ""
63
+ return "" , containerType
54
64
}
55
65
56
- // getDockerNetworkMode determines whether the builder is running as a container
66
+ // getContainerNetworkConfig determines whether the builder is running as a container
57
67
// by examining /proc/self/cgroup. This context is then passed to source-to-image.
58
- func getDockerNetworkMode () s2iapi.DockerNetworkMode {
68
+ // It returns a suitable argument for NetworkMode. If the container platform is
69
+ // CRI-O, it also returns a path for /etc/resolv.conf, suitable for bindmounting.
70
+ func getContainerNetworkConfig () (string , string , error ) {
59
71
file , err := os .Open ("/proc/self/cgroup" )
60
72
if err != nil {
61
- return ""
73
+ return "" , "" , err
62
74
}
63
75
defer file .Close ()
64
76
65
- if id := readNetClsCGroup (file ); id != "" {
66
- return s2iapi .NewDockerNetworkModeContainer (id )
77
+ if id , containerType := readNetClsCGroup (file ); id != "" {
78
+ glog .V (5 ).Infof ("container type=%s" , containerType )
79
+ if containerType != "crio" {
80
+ return s2iapi .DockerNetworkModeContainerPrefix + id , "" , nil
81
+ }
82
+
83
+ crioClient , err := crioclient .New (crio .CrioSocket )
84
+ if err != nil {
85
+ return "" , "" , err
86
+ }
87
+ info , err := crioClient .ContainerInfo (id )
88
+ if err != nil {
89
+ return "" , "" , err
90
+ }
91
+ pid := strconv .Itoa (info .Pid )
92
+ resolvConfHostPath := info .CrioAnnotations [annotations .ResolvPath ]
93
+ if len (resolvConfHostPath ) == 0 {
94
+ return "" , "" , errors .New ("/etc/resolv.conf hostpath is empty" )
95
+ }
96
+
97
+ return fmt .Sprintf ("netns:/proc/%s/ns/net" , pid ), resolvConfHostPath , nil
67
98
}
68
- return ""
99
+ return "" , "" , nil
69
100
}
70
101
71
102
// GetCGroupLimits returns a struct populated with cgroup limit values gathered
0 commit comments