275 lines
		
	
	
		
			7.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			275 lines
		
	
	
		
			7.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
|    Copyright The containerd Authors.
 | |
| 
 | |
|    Licensed under the Apache License, Version 2.0 (the "License");
 | |
|    you may not use this file except in compliance with the License.
 | |
|    You may obtain a copy of the License at
 | |
| 
 | |
|        http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
|    Unless required by applicable law or agreed to in writing, software
 | |
|    distributed under the License is distributed on an "AS IS" BASIS,
 | |
|    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|    See the License for the specific language governing permissions and
 | |
|    limitations under the License.
 | |
| */
 | |
| 
 | |
| package runtime
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"encoding/json"
 | |
| 	"flag"
 | |
| 	"fmt"
 | |
| 	"os"
 | |
| 	"path/filepath"
 | |
| 
 | |
| 	"github.com/containerd/log"
 | |
| 	"github.com/containerd/plugin"
 | |
| 	"github.com/containerd/plugin/registry"
 | |
| 	imagespec "github.com/opencontainers/image-spec/specs-go/v1"
 | |
| 	"k8s.io/klog/v2"
 | |
| 
 | |
| 	criconfig "github.com/containerd/containerd/v2/internal/cri/config"
 | |
| 	"github.com/containerd/containerd/v2/internal/cri/constants"
 | |
| 	"github.com/containerd/containerd/v2/pkg/oci"
 | |
| 	"github.com/containerd/containerd/v2/plugins"
 | |
| 	"github.com/containerd/containerd/v2/plugins/services/warning"
 | |
| 	"github.com/containerd/containerd/v2/version"
 | |
| 	"github.com/containerd/errdefs"
 | |
| 	"github.com/containerd/platforms"
 | |
| )
 | |
| 
 | |
| func init() {
 | |
| 	config := criconfig.DefaultRuntimeConfig()
 | |
| 
 | |
| 	// Base plugin that other CRI services depend on.
 | |
| 	registry.Register(&plugin.Registration{
 | |
| 		Type:   plugins.CRIServicePlugin,
 | |
| 		ID:     "runtime",
 | |
| 		Config: &config,
 | |
| 		Requires: []plugin.Type{
 | |
| 			plugins.WarningPlugin,
 | |
| 		},
 | |
| 		ConfigMigration: configMigration,
 | |
| 		InitFn:          initCRIRuntime,
 | |
| 	})
 | |
| }
 | |
| 
 | |
| func initCRIRuntime(ic *plugin.InitContext) (interface{}, error) {
 | |
| 	ic.Meta.Platforms = []imagespec.Platform{platforms.DefaultSpec()}
 | |
| 	ic.Meta.Exports = map[string]string{"CRIVersion": constants.CRIVersion}
 | |
| 	ctx := ic.Context
 | |
| 	pluginConfig := ic.Config.(*criconfig.RuntimeConfig)
 | |
| 	if warnings, err := criconfig.ValidateRuntimeConfig(ctx, pluginConfig); err != nil {
 | |
| 		return nil, fmt.Errorf("invalid plugin config: %w", err)
 | |
| 	} else if len(warnings) > 0 {
 | |
| 		ws, err := ic.GetSingle(plugins.WarningPlugin)
 | |
| 		if err != nil {
 | |
| 			return nil, err
 | |
| 		}
 | |
| 		warn := ws.(warning.Service)
 | |
| 		for _, w := range warnings {
 | |
| 			warn.Emit(ctx, w)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// For backward compatibility, we have to keep the rootDir and stateDir the same as before.
 | |
| 	containerdRootDir := filepath.Dir(ic.Properties[plugins.PropertyRootDir])
 | |
| 	rootDir := filepath.Join(containerdRootDir, "io.containerd.grpc.v1.cri")
 | |
| 	containerdStateDir := filepath.Dir(ic.Properties[plugins.PropertyStateDir])
 | |
| 	stateDir := filepath.Join(containerdStateDir, "io.containerd.grpc.v1.cri")
 | |
| 	c := criconfig.Config{
 | |
| 		RuntimeConfig:      *pluginConfig,
 | |
| 		ContainerdRootDir:  containerdRootDir,
 | |
| 		ContainerdEndpoint: ic.Properties[plugins.PropertyGRPCAddress],
 | |
| 		RootDir:            rootDir,
 | |
| 		StateDir:           stateDir,
 | |
| 	}
 | |
| 
 | |
| 	// Ignoring errors here; this should never fail.
 | |
| 	cfg, _ := json.Marshal(c)
 | |
| 	log.G(ctx).WithFields(log.Fields{"config": string(cfg)}).Info("starting cri plugin")
 | |
| 
 | |
| 	if err := setGLogLevel(); err != nil {
 | |
| 		return nil, fmt.Errorf("failed to set glog level: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	ociSpec, err := loadBaseOCISpecs(&c)
 | |
| 	if err != nil {
 | |
| 		return nil, fmt.Errorf("failed to create load basic oci spec: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	return &runtime{
 | |
| 		config:       c,
 | |
| 		baseOCISpecs: ociSpec,
 | |
| 	}, nil
 | |
| }
 | |
| 
 | |
| // runtime contains common dependencies for CRI's runtime, image, and podsandbox services.
 | |
| type runtime struct {
 | |
| 	// Config contains all configurations.
 | |
| 	config criconfig.Config
 | |
| 	// BaseOCISpecs contains cached OCI specs loaded via `Runtime.BaseRuntimeSpec`
 | |
| 	baseOCISpecs map[string]*oci.Spec
 | |
| }
 | |
| 
 | |
| func (r *runtime) Config() criconfig.Config {
 | |
| 	return r.config
 | |
| }
 | |
| 
 | |
| func (r *runtime) LoadOCISpec(filename string) (*oci.Spec, error) {
 | |
| 	spec, ok := r.baseOCISpecs[filename]
 | |
| 	if !ok {
 | |
| 		// TODO: Load here or only allow preloading...
 | |
| 		return nil, errdefs.ErrNotFound
 | |
| 	}
 | |
| 	return spec, nil
 | |
| }
 | |
| 
 | |
| func loadBaseOCISpecs(config *criconfig.Config) (map[string]*oci.Spec, error) {
 | |
| 	specs := map[string]*oci.Spec{}
 | |
| 	for _, cfg := range config.Runtimes {
 | |
| 		if cfg.BaseRuntimeSpec == "" {
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		// Don't load same file twice
 | |
| 		if _, ok := specs[cfg.BaseRuntimeSpec]; ok {
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		spec, err := loadOCISpec(cfg.BaseRuntimeSpec)
 | |
| 		if err != nil {
 | |
| 			return nil, fmt.Errorf("failed to load base OCI spec from file: %s: %w", cfg.BaseRuntimeSpec, err)
 | |
| 		}
 | |
| 
 | |
| 		specs[cfg.BaseRuntimeSpec] = spec
 | |
| 	}
 | |
| 
 | |
| 	return specs, nil
 | |
| }
 | |
| 
 | |
| func loadOCISpec(filename string) (*oci.Spec, error) {
 | |
| 	file, err := os.Open(filename)
 | |
| 	if err != nil {
 | |
| 		return nil, fmt.Errorf("failed to open base OCI spec: %s: %w", filename, err)
 | |
| 	}
 | |
| 	defer file.Close()
 | |
| 
 | |
| 	spec := oci.Spec{}
 | |
| 	if err := json.NewDecoder(file).Decode(&spec); err != nil {
 | |
| 		return nil, fmt.Errorf("failed to parse base OCI spec file: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	return &spec, nil
 | |
| }
 | |
| 
 | |
| // Set glog level.
 | |
| func setGLogLevel() error {
 | |
| 	l := log.GetLevel()
 | |
| 	fs := flag.NewFlagSet("klog", flag.PanicOnError)
 | |
| 	klog.InitFlags(fs)
 | |
| 	if err := fs.Set("logtostderr", "true"); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	switch l {
 | |
| 	case log.TraceLevel:
 | |
| 		return fs.Set("v", "5")
 | |
| 	case log.DebugLevel:
 | |
| 		return fs.Set("v", "4")
 | |
| 	case log.InfoLevel:
 | |
| 		return fs.Set("v", "2")
 | |
| 	default:
 | |
| 		// glog doesn't support other filters. Defaults to v=0.
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func configMigration(ctx context.Context, configVersion int, pluginConfigs map[string]interface{}) error {
 | |
| 	if configVersion >= version.ConfigVersion {
 | |
| 		return nil
 | |
| 	}
 | |
| 	src, ok := pluginConfigs[string(plugins.GRPCPlugin)+".cri"].(map[string]interface{})
 | |
| 	if !ok {
 | |
| 		return nil
 | |
| 	}
 | |
| 	dst, ok := pluginConfigs[string(plugins.CRIServicePlugin)+".runtime"].(map[string]interface{})
 | |
| 	if !ok {
 | |
| 		dst = make(map[string]interface{})
 | |
| 	}
 | |
| 	migrateConfig(dst, src)
 | |
| 	pluginConfigs[string(plugins.CRIServicePlugin)+".runtime"] = dst
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func migrateConfig(dst, src map[string]interface{}) {
 | |
| 	for k, v := range src {
 | |
| 		switch k {
 | |
| 		case "containerd":
 | |
| 			// skip (handled separately below)
 | |
| 			continue
 | |
| 		case
 | |
| 			"sandbox_image",
 | |
| 			"registry",
 | |
| 			"image_decryption",
 | |
| 			"max_concurrent_downloads",
 | |
| 			"image_pull_progress_timeout",
 | |
| 			"image_pull_with_sync_fs",
 | |
| 			"stats_collect_period":
 | |
| 			// skip (moved to cri image service plugin)
 | |
| 			continue
 | |
| 		case
 | |
| 			"disable_tcp_service",
 | |
| 			"stream_server_address",
 | |
| 			"stream_server_port",
 | |
| 			"stream_idle_timeout",
 | |
| 			"enable_tls_streaming",
 | |
| 			"x509_key_pair_streaming":
 | |
| 			// skip (moved to cri ServerConfig)
 | |
| 			continue
 | |
| 		default:
 | |
| 			if _, ok := dst[k]; !ok {
 | |
| 				dst[k] = v
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// migrate cri containerd configs
 | |
| 	containerdConf, ok := src["containerd"].(map[string]interface{})
 | |
| 	if !ok {
 | |
| 		return
 | |
| 	}
 | |
| 	newContainerdConf, ok := dst["containerd"].(map[string]interface{})
 | |
| 	if !ok {
 | |
| 		newContainerdConf = map[string]interface{}{}
 | |
| 	}
 | |
| 	for k, v := range containerdConf {
 | |
| 		switch k {
 | |
| 		case "snapshotter", "disable_snapshot_annotations", "discard_unpacked_layers":
 | |
| 			// skip (moved to cri image service plugin)
 | |
| 			continue
 | |
| 		default:
 | |
| 			if _, ok := newContainerdConf[k]; !ok {
 | |
| 				newContainerdConf[k] = v
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 	dst["containerd"] = newContainerdConf
 | |
| 
 | |
| 	// migrate runtimes configs
 | |
| 	runtimesConf, ok := newContainerdConf["runtimes"]
 | |
| 	if !ok {
 | |
| 		return
 | |
| 	}
 | |
| 	for _, v := range runtimesConf.(map[string]interface{}) {
 | |
| 		runtimeConf := v.(map[string]interface{})
 | |
| 		if sandboxMode, ok := runtimeConf["sandbox_mode"]; ok {
 | |
| 			if _, ok := runtimeConf["sandboxer"]; !ok {
 | |
| 				runtimeConf["sandboxer"] = sandboxMode
 | |
| 				delete(runtimeConf, "sandbox_mode")
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| }
 | 
