// +build !windows /* Copyright The containerd Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package server import ( "bytes" "fmt" "io" "os/exec" "strings" "github.com/containerd/containerd/log" "github.com/containernetworking/plugins/pkg/ns" "github.com/pkg/errors" "github.com/sirupsen/logrus" "golang.org/x/net/context" runtime "k8s.io/cri-api/pkg/apis/runtime/v1alpha2" ) // portForward requires `socat` on the node. It uses netns to enter the sandbox namespace, // and run `socat` inside the namespace to forward stream for a specific port. The `socat` // command keeps running until it exits or client disconnect. func (c *criService) portForward(ctx context.Context, id string, port int32, stream io.ReadWriter) error { s, err := c.sandboxStore.Get(id) if err != nil { return errors.Wrapf(err, "failed to find sandbox %q in store", id) } var netNSDo func(func(ns.NetNS) error) error // netNSPath is the network namespace path for logging. var netNSPath string securityContext := s.Config.GetLinux().GetSecurityContext() hostNet := securityContext.GetNamespaceOptions().GetNetwork() == runtime.NamespaceMode_NODE if !hostNet { if closed, err := s.NetNS.Closed(); err != nil { return errors.Wrapf(err, "failed to check netwok namespace closed for sandbox %q", id) } else if closed { return errors.Errorf("network namespace for sandbox %q is closed", id) } netNSDo = s.NetNS.Do netNSPath = s.NetNS.GetPath() } else { // Run the function directly for host network. netNSDo = func(do func(_ ns.NetNS) error) error { return do(nil) } netNSPath = "host" } socat, err := exec.LookPath("socat") if err != nil { return errors.Wrap(err, "failed to find socat") } // Check https://linux.die.net/man/1/socat for meaning of the options. args := []string{socat, "-", fmt.Sprintf("TCP4:localhost:%d", port)} log.G(ctx).Infof("Executing port forwarding command %q in network namespace %q", strings.Join(args, " "), netNSPath) err = netNSDo(func(_ ns.NetNS) error { cmd := exec.Command(args[0], args[1:]...) cmd.Stdout = stream stderr := new(bytes.Buffer) cmd.Stderr = stderr // If we use Stdin, command.Run() won't return until the goroutine that's copying // from stream finishes. Unfortunately, if you have a client like telnet connected // via port forwarding, as long as the user's telnet client is connected to the user's // local listener that port forwarding sets up, the telnet session never exits. This // means that even if socat has finished running, command.Run() won't ever return // (because the client still has the connection and stream open). // // The work around is to use StdinPipe(), as Wait() (called by Run()) closes the pipe // when the command (socat) exits. in, err := cmd.StdinPipe() if err != nil { return errors.Wrap(err, "failed to create stdin pipe") } go func() { if _, err := io.Copy(in, stream); err != nil { logrus.WithError(err).Errorf("Failed to copy port forward input for %q port %d", id, port) } in.Close() logrus.Debugf("Finish copying port forward input for %q port %d", id, port) }() if err := cmd.Run(); err != nil { return errors.Errorf("socat command returns error: %v, stderr: %q", err, stderr.String()) } return nil }) if err != nil { return errors.Wrapf(err, "failed to execute portforward in network namespace %q", netNSPath) } log.G(ctx).Infof("Finish port forwarding for %q port %d", id, port) return nil }