Skip to content

Commit 57a4f0d

Browse files
committed
setup crio networking for build containers
1 parent c2d44ec commit 57a4f0d

File tree

9 files changed

+107
-30
lines changed

9 files changed

+107
-30
lines changed

pkg/build/builder/docker.go

+8-2
Original file line numberDiff line numberDiff line change
@@ -305,9 +305,15 @@ func (d *DockerBuilder) dockerBuild(dir string, tag string, secrets []buildapi.S
305305
NoCache: noCache,
306306
Pull: forcePull,
307307
BuildArgs: buildArgs,
308-
NetworkMode: string(getDockerNetworkMode()),
309308
}
310-
309+
network, resolvConfHostPath, err := getContainerNetworkConfig()
310+
if err != nil {
311+
return err
312+
}
313+
opts.NetworkMode = network
314+
if len(resolvConfHostPath) != 0 {
315+
opts.BuildBinds = fmt.Sprintf("[\"%s:/etc/resolv.conf\"]", resolvConfHostPath)
316+
}
311317
// Though we are capped on memory and cpu at the cgroup parent level,
312318
// some build containers care what their memory limit is so they can
313319
// adapt, thus we need to set the memory limit at the container level

pkg/build/builder/sti.go

+10-1
Original file line numberDiff line numberDiff line change
@@ -166,6 +166,11 @@ func (s *S2IBuilder) Build() error {
166166
}
167167
}
168168

169+
networkMode, resolvConfHostPath, err := getContainerNetworkConfig()
170+
if err != nil {
171+
return err
172+
}
173+
169174
config := &s2iapi.Config{
170175
// Save some processing time by not cleaning up (the container will go away anyway)
171176
PreserveWorkingDir: true,
@@ -182,7 +187,7 @@ func (s *S2IBuilder) Build() error {
182187

183188
Environment: buildEnvVars(s.build, sourceInfo),
184189
Labels: s2iBuildLabels(s.build, sourceInfo),
185-
DockerNetworkMode: getDockerNetworkMode(),
190+
DockerNetworkMode: s2iapi.DockerNetworkMode(networkMode),
186191

187192
Source: &s2igit.URL{URL: url.URL{Path: srcDir}, Type: s2igit.URLTypeLocal},
188193
ContextDir: contextDir,
@@ -197,6 +202,10 @@ func (s *S2IBuilder) Build() error {
197202
BlockOnBuild: true,
198203
}
199204

205+
if len(resolvConfHostPath) != 0 {
206+
config.BuildVolumes = []string{fmt.Sprintf("%s:/etc/resolv.conf", resolvConfHostPath)}
207+
}
208+
200209
if s.build.Spec.Strategy.SourceStrategy.ForcePull {
201210
glog.V(4).Infof("With force pull true, setting policies to %s", s2iapi.PullAlways)
202211
config.BuilderPullPolicy = s2iapi.PullAlways

pkg/build/builder/util.go

+43-12
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@ package builder
22

33
import (
44
"bufio"
5+
"errors"
56
"fmt"
67
"io"
78
"io/ioutil"
@@ -11,6 +12,10 @@ import (
1112
"strconv"
1213
"strings"
1314

15+
"github.com/google/cadvisor/container/crio"
16+
crioclient "github.com/kubernetes-incubator/cri-o/client"
17+
"github.com/kubernetes-incubator/cri-o/pkg/annotations"
18+
1419
docker "github.com/fsouza/go-dockerclient"
1520

1621
s2iapi "github.com/openshift/source-to-image/pkg/api"
@@ -20,17 +25,22 @@ import (
2025

2126
var (
2227
// procCGroupPattern is a regular expression that parses the entries in /proc/self/cgroup
23-
procCGroupPattern = regexp.MustCompile(`\d+:([a-z_,]+):/.*/(docker-|)([a-z0-9]+).*`)
28+
procCGroupPattern = regexp.MustCompile(`\d+:([a-z_,]+):/.*/(\w+-|)([a-z0-9]+).*`)
2429
)
2530

2631
// readNetClsCGroup parses /proc/self/cgroup in order to determine the container id that can be used
27-
// the network namespace that this process is running on.
28-
func readNetClsCGroup(reader io.Reader) string {
29-
cgroups := make(map[string]string)
32+
// the network namespace that this process is running on, it returns the cgroup and container type
33+
// (docker vs crio).
34+
func readNetClsCGroup(reader io.Reader) (string, string) {
35+
36+
containerType := "docker"
3037

38+
cgroups := make(map[string]string)
3139
scanner := bufio.NewScanner(reader)
3240
for scanner.Scan() {
3341
if match := procCGroupPattern.FindStringSubmatch(scanner.Text()); match != nil {
42+
containerType = strings.TrimSuffix(match[2], "-")
43+
3444
list := strings.Split(match[1], ",")
3545
containerId := match[3]
3646
if len(list) > 0 {
@@ -46,26 +56,47 @@ func readNetClsCGroup(reader io.Reader) string {
4656
names := []string{"net_cls", "cpu"}
4757
for _, group := range names {
4858
if value, ok := cgroups[group]; ok {
49-
return value
59+
return value, containerType
5060
}
5161
}
5262

53-
return ""
63+
return "", containerType
5464
}
5565

56-
// getDockerNetworkMode determines whether the builder is running as a container
66+
// getContainerNetworkConfig determines whether the builder is running as a container
5767
// by examining /proc/self/cgroup. This context is then passed to source-to-image.
58-
func getDockerNetworkMode() s2iapi.DockerNetworkMode {
68+
// It returns a suitable argument for NetworkMode. If the container platform is
69+
// CRI-O, it also returns a path for /etc/resolv.conf, suitable for bindmounting.
70+
func getContainerNetworkConfig() (string, string, error) {
5971
file, err := os.Open("/proc/self/cgroup")
6072
if err != nil {
61-
return ""
73+
return "", "", err
6274
}
6375
defer file.Close()
6476

65-
if id := readNetClsCGroup(file); id != "" {
66-
return s2iapi.NewDockerNetworkModeContainer(id)
77+
if id, containerType := readNetClsCGroup(file); id != "" {
78+
glog.V(5).Infof("container type=%s", containerType)
79+
if containerType != "crio" {
80+
return s2iapi.DockerNetworkModeContainerPrefix + id, "", nil
81+
}
82+
83+
crioClient, err := crioclient.New(crio.CrioSocket)
84+
if err != nil {
85+
return "", "", err
86+
}
87+
info, err := crioClient.ContainerInfo(id)
88+
if err != nil {
89+
return "", "", err
90+
}
91+
pid := strconv.Itoa(info.Pid)
92+
resolvConfHostPath := info.CrioAnnotations[annotations.ResolvPath]
93+
if len(resolvConfHostPath) == 0 {
94+
return "", "", errors.New("/etc/resolv.conf hostpath is empty")
95+
}
96+
97+
return fmt.Sprintf("netns:/proc/%s/ns/net", pid), resolvConfHostPath, nil
6798
}
68-
return ""
99+
return "", "", nil
69100
}
70101

71102
// GetCGroupLimits returns a struct populated with cgroup limit values gathered

pkg/build/builder/util_test.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ func TestCGroups_CentOS7_Docker1_7(t *testing.T) {
1919
1:name=systemd:/system.slice/docker.service
2020
`
2121
buffer := bytes.NewBufferString(example)
22-
containerId := readNetClsCGroup(buffer)
22+
containerId, _ := readNetClsCGroup(buffer)
2323

2424
if containerId != "5617ed7e7e487d2c4dd2e013e361109b4eceabfe3fa8c7aea9e37498b1aed5fa" {
2525
t.Errorf("got %s, expected 5617ed7e7e487d2c4dd2e013e361109b4eceabfe3fa8c7aea9e37498b1aed5fa", containerId)
@@ -38,7 +38,7 @@ func TestCGroups_Ubuntu_Docker1_9(t *testing.T) {
3838
3:cpuset:/docker/bfea6eb2d60179355e370a5d277d496eb0fe75d9a5a47c267221e87dbbbbc93b
3939
2:name=systemd:/`
4040
buffer := bytes.NewBufferString(example)
41-
containerId := readNetClsCGroup(buffer)
41+
containerId, _ := readNetClsCGroup(buffer)
4242

4343
if containerId != "bfea6eb2d60179355e370a5d277d496eb0fe75d9a5a47c267221e87dbbbbc93b" {
4444
t.Errorf("got %s, expected bfea6eb2d60179355e370a5d277d496eb0fe75d9a5a47c267221e87dbbbbc93b", containerId)

pkg/build/controller/strategy/docker.go

+1
Original file line numberDiff line numberDiff line change
@@ -157,6 +157,7 @@ func (bs *DockerBuildStrategy) CreateBuildPod(build *buildapi.Build) (*v1.Pod, e
157157

158158
setOwnerReference(pod, build)
159159
setupDockerSocket(pod)
160+
setupCrioSocket(pod)
160161
setupDockerSecrets(pod, &pod.Spec.Containers[0], build.Spec.Output.PushSecret, strategy.PullSecret, build.Spec.Source.Images)
161162
// For any secrets the user wants to reference from their Assemble script or Dockerfile, mount those
162163
// secrets into the main container. The main container includes logic to copy them from the mounted

pkg/build/controller/strategy/docker_test.go

+8-6
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,8 @@ import (
55
"strings"
66
"testing"
77

8+
"github.com/google/cadvisor/container/crio"
9+
810
"k8s.io/apimachinery/pkg/api/resource"
911
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
1012
"k8s.io/apimachinery/pkg/runtime"
@@ -63,20 +65,20 @@ func TestDockerCreateBuildPod(t *testing.T) {
6365
t.Errorf("Expected environment keys:\n%v\ngot keys\n%v", expectedKeys, gotKeys)
6466
}
6567

66-
// the pod has 5 volumes but the git source secret is not mounted into the main container.
67-
if len(container.VolumeMounts) != 4 {
68-
t.Fatalf("Expected 4 volumes in container, got %d", len(container.VolumeMounts))
68+
// the pod has 6 volumes but the git source secret is not mounted into the main container.
69+
if len(container.VolumeMounts) != 5 {
70+
t.Fatalf("Expected 5 volumes in container, got %d", len(container.VolumeMounts))
6971
}
7072
if *actual.Spec.ActiveDeadlineSeconds != 60 {
7173
t.Errorf("Expected ActiveDeadlineSeconds 60, got %d", *actual.Spec.ActiveDeadlineSeconds)
7274
}
73-
for i, expected := range []string{buildutil.BuildWorkDirMount, dockerSocketPath, DockerPushSecretMountPath, DockerPullSecretMountPath} {
75+
for i, expected := range []string{buildutil.BuildWorkDirMount, dockerSocketPath, crio.CrioSocket, DockerPushSecretMountPath, DockerPullSecretMountPath} {
7476
if container.VolumeMounts[i].MountPath != expected {
7577
t.Fatalf("Expected %s in VolumeMount[%d], got %s", expected, i, container.VolumeMounts[i].MountPath)
7678
}
7779
}
78-
if len(actual.Spec.Volumes) != 5 {
79-
t.Fatalf("Expected 5 volumes in Build pod, got %d", len(actual.Spec.Volumes))
80+
if len(actual.Spec.Volumes) != 6 {
81+
t.Fatalf("Expected 6 volumes in Build pod, got %d", len(actual.Spec.Volumes))
8082
}
8183
if !kapihelper.Semantic.DeepEqual(container.Resources, util.CopyApiResourcesToV1Resources(&build.Spec.Resources)) {
8284
t.Fatalf("Expected actual=expected, %v != %v", container.Resources, build.Spec.Resources)

pkg/build/controller/strategy/sti.go

+1
Original file line numberDiff line numberDiff line change
@@ -178,6 +178,7 @@ func (bs *SourceBuildStrategy) CreateBuildPod(build *buildapi.Build) (*v1.Pod, e
178178

179179
setOwnerReference(pod, build)
180180
setupDockerSocket(pod)
181+
setupCrioSocket(pod)
181182
setupDockerSecrets(pod, &pod.Spec.Containers[0], build.Spec.Output.PushSecret, strategy.PullSecret, build.Spec.Source.Images)
182183
// For any secrets the user wants to reference from their Assemble script or Dockerfile, mount those
183184
// secrets into the main container. The main container includes logic to copy them from the mounted

pkg/build/controller/strategy/sti_test.go

+8-6
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,8 @@ import (
66
"strings"
77
"testing"
88

9+
"github.com/google/cadvisor/container/crio"
10+
911
"k8s.io/apimachinery/pkg/api/resource"
1012
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
1113
"k8s.io/apimachinery/pkg/runtime"
@@ -98,17 +100,17 @@ func testSTICreateBuildPod(t *testing.T, rootAllowed bool) {
98100
t.Errorf("Expected environment keys:\n%v\ngot keys\n%v", expectedKeys, gotKeys)
99101
}
100102

101-
// the pod has 5 volumes but the git source secret is not mounted into the main container.
102-
if len(container.VolumeMounts) != 4 {
103-
t.Fatalf("Expected 4 volumes in container, got %d", len(container.VolumeMounts))
103+
// the pod has 6 volumes but the git source secret is not mounted into the main container.
104+
if len(container.VolumeMounts) != 5 {
105+
t.Fatalf("Expected 5 volumes in container, got %d", len(container.VolumeMounts))
104106
}
105-
for i, expected := range []string{buildutil.BuildWorkDirMount, dockerSocketPath, DockerPushSecretMountPath, DockerPullSecretMountPath} {
107+
for i, expected := range []string{buildutil.BuildWorkDirMount, dockerSocketPath, crio.CrioSocket, DockerPushSecretMountPath, DockerPullSecretMountPath} {
106108
if container.VolumeMounts[i].MountPath != expected {
107109
t.Fatalf("Expected %s in VolumeMount[%d], got %s", expected, i, container.VolumeMounts[i].MountPath)
108110
}
109111
}
110-
if len(actual.Spec.Volumes) != 5 {
111-
t.Fatalf("Expected 5 volumes in Build pod, got %d", len(actual.Spec.Volumes))
112+
if len(actual.Spec.Volumes) != 6 {
113+
t.Fatalf("Expected 6 volumes in Build pod, got %d", len(actual.Spec.Volumes))
112114
}
113115
if *actual.Spec.ActiveDeadlineSeconds != 60 {
114116
t.Errorf("Expected ActiveDeadlineSeconds 60, got %d", *actual.Spec.ActiveDeadlineSeconds)

pkg/build/controller/strategy/util.go

+26-1
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,14 @@ import (
66
"strconv"
77
"strings"
88

9+
"github.com/golang/glog"
10+
"github.com/google/cadvisor/container/crio"
11+
912
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
1013
kvalidation "k8s.io/apimachinery/pkg/util/validation"
1114
kapi "k8s.io/kubernetes/pkg/api"
1215
"k8s.io/kubernetes/pkg/api/v1"
1316

14-
"github.com/golang/glog"
1517
"github.com/openshift/origin/pkg/api/apihelpers"
1618
buildapi "github.com/openshift/origin/pkg/build/apis/build"
1719
buildapiv1 "github.com/openshift/origin/pkg/build/apis/build/v1"
@@ -91,6 +93,29 @@ func setupDockerSocket(pod *v1.Pod) {
9193
}
9294
}
9395

96+
// setupCrioSocket configures the pod to support the host's Crio socket
97+
func setupCrioSocket(pod *v1.Pod) {
98+
crioSocketVolume := v1.Volume{
99+
Name: "crio-socket",
100+
VolumeSource: v1.VolumeSource{
101+
HostPath: &v1.HostPathVolumeSource{
102+
Path: crio.CrioSocket,
103+
},
104+
},
105+
}
106+
107+
crioSocketVolumeMount := v1.VolumeMount{
108+
Name: "crio-socket",
109+
MountPath: crio.CrioSocket,
110+
}
111+
112+
pod.Spec.Volumes = append(pod.Spec.Volumes,
113+
crioSocketVolume)
114+
pod.Spec.Containers[0].VolumeMounts =
115+
append(pod.Spec.Containers[0].VolumeMounts,
116+
crioSocketVolumeMount)
117+
}
118+
94119
// mountSecretVolume is a helper method responsible for actual mounting secret
95120
// volumes into a pod.
96121
func mountSecretVolume(pod *v1.Pod, container *v1.Container, secretName, mountPath, volumeSuffix string) {

0 commit comments

Comments
 (0)