139 lines
5.0 KiB
Go
139 lines
5.0 KiB
Go
/*
|
|
Copyright The containerd Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package server
|
|
|
|
import (
|
|
"fmt"
|
|
"io"
|
|
"net"
|
|
"time"
|
|
|
|
"github.com/containerd/containerd/log"
|
|
"github.com/containernetworking/plugins/pkg/ns"
|
|
"github.com/pkg/errors"
|
|
"golang.org/x/net/context"
|
|
|
|
runtime "k8s.io/cri-api/pkg/apis/runtime/v1"
|
|
)
|
|
|
|
// portForward uses netns to enter the sandbox namespace, and forwards a stream inside the
|
|
// the namespace to a specific port. It keeps forwarding until it exits or client disconnect.
|
|
func (c *criService) portForward(ctx context.Context, id string, port int32, stream io.ReadWriteCloser) error {
|
|
s, err := c.sandboxStore.Get(id)
|
|
if err != nil {
|
|
return errors.Wrapf(err, "failed to find sandbox %q in store", id)
|
|
}
|
|
|
|
var netNSDo func(func(ns.NetNS) error) error
|
|
// netNSPath is the network namespace path for logging.
|
|
var netNSPath string
|
|
securityContext := s.Config.GetLinux().GetSecurityContext()
|
|
hostNet := securityContext.GetNamespaceOptions().GetNetwork() == runtime.NamespaceMode_NODE
|
|
if !hostNet {
|
|
if closed, err := s.NetNS.Closed(); err != nil {
|
|
return errors.Wrapf(err, "failed to check netwok namespace closed for sandbox %q", id)
|
|
} else if closed {
|
|
return errors.Errorf("network namespace for sandbox %q is closed", id)
|
|
}
|
|
netNSDo = s.NetNS.Do
|
|
netNSPath = s.NetNS.GetPath()
|
|
} else {
|
|
// Run the function directly for host network.
|
|
netNSDo = func(do func(_ ns.NetNS) error) error {
|
|
return do(nil)
|
|
}
|
|
netNSPath = "host"
|
|
}
|
|
|
|
log.G(ctx).Infof("Executing port forwarding in network namespace %q", netNSPath)
|
|
err = netNSDo(func(_ ns.NetNS) error {
|
|
defer stream.Close()
|
|
// localhost can resolve to both IPv4 and IPv6 addresses in dual-stack systems
|
|
// but the application can be listening in one of the IP families only.
|
|
// golang has enabled RFC 6555 Fast Fallback (aka HappyEyeballs) by default in 1.12
|
|
// It means that if a host resolves to both IPv6 and IPv4, it will try to connect to any
|
|
// of those addresses and use the working connection.
|
|
// However, the implementation uses go routines to start both connections in parallel,
|
|
// and this cases that the connection is done outside the namespace, so we try to connect
|
|
// serially.
|
|
// We try IPv4 first to keep current behavior and we fallback to IPv6 if the connection fails.
|
|
// xref https://github.com/golang/go/issues/44922
|
|
var conn net.Conn
|
|
conn, err := net.Dial("tcp4", fmt.Sprintf("localhost:%d", port))
|
|
if err != nil {
|
|
var errV6 error
|
|
conn, errV6 = net.Dial("tcp6", fmt.Sprintf("localhost:%d", port))
|
|
if errV6 != nil {
|
|
return fmt.Errorf("failed to connect to localhost:%d inside namespace %q, IPv4: %v IPv6 %v ", port, id, err, errV6)
|
|
}
|
|
}
|
|
defer conn.Close()
|
|
|
|
errCh := make(chan error, 2)
|
|
// Copy from the the namespace port connection to the client stream
|
|
go func() {
|
|
log.G(ctx).Debugf("PortForward copying data from namespace %q port %d to the client stream", id, port)
|
|
_, err := io.Copy(stream, conn)
|
|
errCh <- err
|
|
}()
|
|
|
|
// Copy from the client stream to the namespace port connection
|
|
go func() {
|
|
log.G(ctx).Debugf("PortForward copying data from client stream to namespace %q port %d", id, port)
|
|
_, err := io.Copy(conn, stream)
|
|
errCh <- err
|
|
}()
|
|
|
|
// Wait until the first error is returned by one of the connections
|
|
// we use errFwd to store the result of the port forwarding operation
|
|
// if the context is cancelled close everything and return
|
|
var errFwd error
|
|
select {
|
|
case errFwd = <-errCh:
|
|
log.G(ctx).Debugf("PortForward stop forwarding in one direction in network namespace %q port %d: %v", id, port, errFwd)
|
|
case <-ctx.Done():
|
|
log.G(ctx).Debugf("PortForward cancelled in network namespace %q port %d: %v", id, port, ctx.Err())
|
|
return ctx.Err()
|
|
}
|
|
// give a chance to terminate gracefully or timeout
|
|
// after 1s
|
|
// https://linux.die.net/man/1/socat
|
|
const timeout = time.Second
|
|
select {
|
|
case e := <-errCh:
|
|
if errFwd == nil {
|
|
errFwd = e
|
|
}
|
|
log.G(ctx).Debugf("PortForward stopped forwarding in both directions in network namespace %q port %d: %v", id, port, e)
|
|
case <-time.After(timeout):
|
|
log.G(ctx).Debugf("PortForward timed out waiting to close the connection in network namespace %q port %d", id, port)
|
|
case <-ctx.Done():
|
|
log.G(ctx).Debugf("PortForward cancelled in network namespace %q port %d: %v", id, port, ctx.Err())
|
|
errFwd = ctx.Err()
|
|
}
|
|
|
|
return errFwd
|
|
})
|
|
|
|
if err != nil {
|
|
return errors.Wrapf(err, "failed to execute portforward in network namespace %q", netNSPath)
|
|
}
|
|
log.G(ctx).Infof("Finish port forwarding for %q port %d", id, port)
|
|
|
|
return nil
|
|
}
|