Merge pull request #1149 from weiwei04/share_pid_namespace
share pid namespace for Pod container
This commit is contained in:
commit
d68da8929a
8 changed files with 96 additions and 2 deletions
|
@ -115,6 +115,9 @@ default_mounts = [
|
||||||
# pids_limit is the number of processes allowed in a container
|
# pids_limit is the number of processes allowed in a container
|
||||||
pids_limit = {{ .PidsLimit }}
|
pids_limit = {{ .PidsLimit }}
|
||||||
|
|
||||||
|
# disable using a shared PID namespace for containers in a pod
|
||||||
|
disable_shared_pid_namespace = {{ .DisableSharedPIDNamespace }}
|
||||||
|
|
||||||
# log_size_max is the max limit for the container log size in bytes.
|
# log_size_max is the max limit for the container log size in bytes.
|
||||||
# Negative values indicate that no limit is imposed.
|
# Negative values indicate that no limit is imposed.
|
||||||
log_size_max = {{ .LogSizeMax }}
|
log_size_max = {{ .LogSizeMax }}
|
||||||
|
|
|
@ -132,6 +132,9 @@ func mergeConfig(config *server.Config, ctx *cli.Context) error {
|
||||||
if ctx.GlobalIsSet("pids-limit") {
|
if ctx.GlobalIsSet("pids-limit") {
|
||||||
config.PidsLimit = ctx.GlobalInt64("pids-limit")
|
config.PidsLimit = ctx.GlobalInt64("pids-limit")
|
||||||
}
|
}
|
||||||
|
if ctx.GlobalIsSet("disable-shared-pid-namespace") {
|
||||||
|
config.DisableSharedPIDNamespace = ctx.GlobalBool("disable-shared-pid-namespace")
|
||||||
|
}
|
||||||
if ctx.GlobalIsSet("log-size-max") {
|
if ctx.GlobalIsSet("log-size-max") {
|
||||||
config.LogSizeMax = ctx.GlobalInt64("log-size-max")
|
config.LogSizeMax = ctx.GlobalInt64("log-size-max")
|
||||||
}
|
}
|
||||||
|
@ -297,6 +300,10 @@ func main() {
|
||||||
Value: libkpod.DefaultPidsLimit,
|
Value: libkpod.DefaultPidsLimit,
|
||||||
Usage: "maximum number of processes allowed in a container",
|
Usage: "maximum number of processes allowed in a container",
|
||||||
},
|
},
|
||||||
|
cli.BoolFlag{
|
||||||
|
Name: "disable-shared-pid-namespace",
|
||||||
|
Usage: "disable using a shared PID namespace for containers in a pod",
|
||||||
|
},
|
||||||
cli.Int64Flag{
|
cli.Int64Flag{
|
||||||
Name: "log-size-max",
|
Name: "log-size-max",
|
||||||
Value: libkpod.DefaultLogSizeMax,
|
Value: libkpod.DefaultLogSizeMax,
|
||||||
|
|
|
@ -118,6 +118,9 @@ set the CPU profile file path
|
||||||
**--pids-limit**=""
|
**--pids-limit**=""
|
||||||
Maximum number of processes allowed in a container (default: 1024)
|
Maximum number of processes allowed in a container (default: 1024)
|
||||||
|
|
||||||
|
**--disable-shared-pid-namespace**=""
|
||||||
|
Disable using a shared PID namespace for containers in a pod (default: false)
|
||||||
|
|
||||||
**--root**=""
|
**--root**=""
|
||||||
The crio root dir (default: "/var/lib/containers/storage")
|
The crio root dir (default: "/var/lib/containers/storage")
|
||||||
|
|
||||||
|
|
|
@ -87,6 +87,9 @@ Example:
|
||||||
**pids_limit**=""
|
**pids_limit**=""
|
||||||
Maximum number of processes allowed in a container (default: 1024)
|
Maximum number of processes allowed in a container (default: 1024)
|
||||||
|
|
||||||
|
**disable_shared_pid_namespace**=""
|
||||||
|
Disable using a shared PID namespace for containers in a pod (default: false)
|
||||||
|
|
||||||
**runtime**=""
|
**runtime**=""
|
||||||
OCI runtime path (default: "/usr/bin/runc")
|
OCI runtime path (default: "/usr/bin/runc")
|
||||||
|
|
||||||
|
|
|
@ -121,6 +121,9 @@ type RuntimeConfig struct {
|
||||||
// NoPivot instructs the runtime to not use `pivot_root`, but instead use `MS_MOVE`
|
// NoPivot instructs the runtime to not use `pivot_root`, but instead use `MS_MOVE`
|
||||||
NoPivot bool `toml:"no_pivot"`
|
NoPivot bool `toml:"no_pivot"`
|
||||||
|
|
||||||
|
// DisableSharePidNamespace instructs the runtime to disable share pid namespace
|
||||||
|
DisableSharedPIDNamespace bool `toml:"disable_shared_pid_namespace"`
|
||||||
|
|
||||||
// Conmon is the path to conmon binary, used for managing the runtime.
|
// Conmon is the path to conmon binary, used for managing the runtime.
|
||||||
Conmon string `toml:"conmon"`
|
Conmon string `toml:"conmon"`
|
||||||
|
|
||||||
|
|
|
@ -921,9 +921,15 @@ func (s *Server) createSandboxContainer(ctx context.Context, containerID string,
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
// Do not share pid ns for now
|
|
||||||
if containerConfig.GetLinux().GetSecurityContext().GetNamespaceOptions().GetHostPid() {
|
if containerConfig.GetLinux().GetSecurityContext().GetNamespaceOptions().GetHostPid() {
|
||||||
|
// kubernetes PodSpec specify to use Host PID namespace
|
||||||
specgen.RemoveLinuxNamespace(string(rspec.PIDNamespace))
|
specgen.RemoveLinuxNamespace(string(rspec.PIDNamespace))
|
||||||
|
} else if !s.config.DisableSharedPIDNamespace {
|
||||||
|
// share Pod PID namespace
|
||||||
|
pidNsPath := fmt.Sprintf("/proc/%d/ns/pid", podInfraState.Pid)
|
||||||
|
if err := specgen.AddOrReplaceLinuxNamespace(string(rspec.PIDNamespace), pidNsPath); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
netNsPath := sb.NetNsPath()
|
netNsPath := sb.NetNsPath()
|
||||||
|
|
|
@ -56,6 +56,8 @@ IMAGE_VOLUMES=${IMAGE_VOLUMES:-mkdir}
|
||||||
PIDS_LIMIT=${PIDS_LIMIT:-1024}
|
PIDS_LIMIT=${PIDS_LIMIT:-1024}
|
||||||
# Log size max limit
|
# Log size max limit
|
||||||
LOG_SIZE_MAX_LIMIT=${LOG_SIZE_MAX_LIMIT:--1}
|
LOG_SIZE_MAX_LIMIT=${LOG_SIZE_MAX_LIMIT:--1}
|
||||||
|
# enable share container pid namespace
|
||||||
|
DISABLE_SHARED_PID_NAMESPACE=${DISABLE_SHARED_PID_NAMESPACE:-false}
|
||||||
|
|
||||||
TESTDIR=$(mktemp -d)
|
TESTDIR=$(mktemp -d)
|
||||||
|
|
||||||
|
@ -240,7 +242,7 @@ function start_crio() {
|
||||||
"$COPYIMG_BINARY" --root "$TESTDIR/crio" $STORAGE_OPTIONS --runroot "$TESTDIR/crio-run" --image-name=mrunalp/image-volume-test --import-from=dir:"$ARTIFACTS_PATH"/image-volume-test-image --add-name=docker.io/library/mrunalp/image-volume-test --signature-policy="$INTEGRATION_ROOT"/policy.json
|
"$COPYIMG_BINARY" --root "$TESTDIR/crio" $STORAGE_OPTIONS --runroot "$TESTDIR/crio-run" --image-name=mrunalp/image-volume-test --import-from=dir:"$ARTIFACTS_PATH"/image-volume-test-image --add-name=docker.io/library/mrunalp/image-volume-test --signature-policy="$INTEGRATION_ROOT"/policy.json
|
||||||
"$COPYIMG_BINARY" --root "$TESTDIR/crio" $STORAGE_OPTIONS --runroot "$TESTDIR/crio-run" --image-name=busybox:latest --import-from=dir:"$ARTIFACTS_PATH"/busybox-image --add-name=docker.io/library/busybox:latest --signature-policy="$INTEGRATION_ROOT"/policy.json
|
"$COPYIMG_BINARY" --root "$TESTDIR/crio" $STORAGE_OPTIONS --runroot "$TESTDIR/crio-run" --image-name=busybox:latest --import-from=dir:"$ARTIFACTS_PATH"/busybox-image --add-name=docker.io/library/busybox:latest --signature-policy="$INTEGRATION_ROOT"/policy.json
|
||||||
"$COPYIMG_BINARY" --root "$TESTDIR/crio" $STORAGE_OPTIONS --runroot "$TESTDIR/crio-run" --image-name=runcom/stderr-test:latest --import-from=dir:"$ARTIFACTS_PATH"/stderr-test --add-name=docker.io/runcom/stderr-test:latest --signature-policy="$INTEGRATION_ROOT"/policy.json
|
"$COPYIMG_BINARY" --root "$TESTDIR/crio" $STORAGE_OPTIONS --runroot "$TESTDIR/crio-run" --image-name=runcom/stderr-test:latest --import-from=dir:"$ARTIFACTS_PATH"/stderr-test --add-name=docker.io/runcom/stderr-test:latest --signature-policy="$INTEGRATION_ROOT"/policy.json
|
||||||
"$CRIO_BINARY" ${DEFAULT_MOUNTS_OPTS} ${HOOKS_OPTS} --conmon "$CONMON_BINARY" --listen "$CRIO_SOCKET" --cgroup-manager "$CGROUP_MANAGER" --registry "docker.io" --runtime "$RUNTIME_BINARY" --root "$TESTDIR/crio" --runroot "$TESTDIR/crio-run" $STORAGE_OPTIONS --seccomp-profile "$seccomp" --apparmor-profile "$apparmor" --cni-config-dir "$CRIO_CNI_CONFIG" --cni-plugin-dir "$CRIO_CNI_PLUGIN" --signature-policy "$INTEGRATION_ROOT"/policy.json --image-volumes "$IMAGE_VOLUMES" --pids-limit "$PIDS_LIMIT" --log-size-max "$LOG_SIZE_MAX_LIMIT" --config /dev/null config >$CRIO_CONFIG
|
"$CRIO_BINARY" ${DEFAULT_MOUNTS_OPTS} ${HOOKS_OPTS} --conmon "$CONMON_BINARY" --listen "$CRIO_SOCKET" --cgroup-manager "$CGROUP_MANAGER" --registry "docker.io" --runtime "$RUNTIME_BINARY" --root "$TESTDIR/crio" --runroot "$TESTDIR/crio-run" $STORAGE_OPTIONS --seccomp-profile "$seccomp" --apparmor-profile "$apparmor" --cni-config-dir "$CRIO_CNI_CONFIG" --cni-plugin-dir "$CRIO_CNI_PLUGIN" --signature-policy "$INTEGRATION_ROOT"/policy.json --image-volumes "$IMAGE_VOLUMES" --pids-limit "$PIDS_LIMIT" --disable-shared-pid-namespace=${DISABLE_SHARED_PID_NAMESPACE} --log-size-max "$LOG_SIZE_MAX_LIMIT" --config /dev/null config >$CRIO_CONFIG
|
||||||
|
|
||||||
# Prepare the CNI configuration files, we're running with non host networking by default
|
# Prepare the CNI configuration files, we're running with non host networking by default
|
||||||
if [[ -n "$4" ]]; then
|
if [[ -n "$4" ]]; then
|
||||||
|
|
67
test/namespaces.bats
Normal file
67
test/namespaces.bats
Normal file
|
@ -0,0 +1,67 @@
|
||||||
|
#!/usr/bin/env bats
|
||||||
|
|
||||||
|
load helpers
|
||||||
|
|
||||||
|
function teardown() {
|
||||||
|
cleanup_test
|
||||||
|
}
|
||||||
|
|
||||||
|
@test "pod disable shared pid namespace" {
|
||||||
|
DISABLE_SHARED_PID_NAMESPACE="true" start_crio
|
||||||
|
|
||||||
|
run crictl runs "$TESTDATA"/sandbox_config.json
|
||||||
|
echo "$output"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
pod_id="$output"
|
||||||
|
run crictl create "$pod_id" "$TESTDATA"/container_redis.json "$TESTDATA"/sandbox_config.json
|
||||||
|
echo "$output"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
ctr_id="$output"
|
||||||
|
run crictl start "$ctr_id"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
|
||||||
|
run crictl exec --sync "$ctr_id" cat /proc/1/cmdline
|
||||||
|
echo "$output"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[[ "$output" =~ "redis" ]]
|
||||||
|
|
||||||
|
run crictl stops "$pod_id"
|
||||||
|
echo "$output"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
run crictl rms "$pod_id"
|
||||||
|
echo "$output"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
cleanup_ctrs
|
||||||
|
cleanup_pods
|
||||||
|
stop_crio
|
||||||
|
}
|
||||||
|
|
||||||
|
@test "pod enable shared pid namespace" {
|
||||||
|
DISABLE_SHARED_PID_NAMESPACE="false" start_crio
|
||||||
|
|
||||||
|
run crictl runs "$TESTDATA"/sandbox_config.json
|
||||||
|
echo "$output"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
pod_id="$output"
|
||||||
|
run crictl create "$pod_id" "$TESTDATA"/container_redis.json "$TESTDATA"/sandbox_config.json
|
||||||
|
echo "$output"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
ctr_id="$output"
|
||||||
|
run crictl start "$ctr_id"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
|
||||||
|
run crictl exec --sync "$ctr_id" cat /proc/1/cmdline
|
||||||
|
echo "$output"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[[ "$output" =~ "pause" ]]
|
||||||
|
|
||||||
|
run crictl stops "$pod_id"
|
||||||
|
echo "$output"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
run crictl rms "$pod_id"
|
||||||
|
echo "$output"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
cleanup_ctrs
|
||||||
|
cleanup_pods
|
||||||
|
stop_crio
|
||||||
|
}
|
Loading…
Reference in a new issue