8e5b17cf13
Signed-off-by: Mrunal Patel <mrunalp@gmail.com>
282 lines
No EOL
16 KiB
Markdown
282 lines
No EOL
16 KiB
Markdown
# Container Networking Interface Proposal
|
|
|
|
## Version
|
|
This is CNI **spec** version **0.2.0**.
|
|
|
|
Note that this is **independent from the version of the CNI library and plugins** in this repository (e.g. the versions of [releases](https://github.com/containernetworking/cni/releases)).
|
|
|
|
## Overview
|
|
|
|
This document proposes a generic plugin-based networking solution for application containers on Linux, the _Container Networking Interface_, or _CNI_.
|
|
It is derived from the [rkt Networking Proposal][rkt-networking-proposal], which aimed to satisfy many of the [design considerations][rkt-networking-design] for networking in [rkt][rkt-github].
|
|
|
|
For the purposes of this proposal, we define two terms very specifically:
|
|
- _container_ can be considered synonymous with a [Linux _network namespace_][namespaces]. What unit this corresponds to depends on a particular container runtime implementation: for example, in implementations of the [App Container Spec][appc-github] like rkt, each _pod_ runs in a unique network namespace. In [Docker][docker], on the other hand, network namespaces generally exist for each separate Docker container.
|
|
- _network_ refers to a group of entities that are uniquely addressable that can communicate amongst each other. This could be either an individual container (as specified above), a machine, or some other network device (e.g. a router). Containers can be conceptually _added to_ or _removed from_ one or more networks.
|
|
|
|
[rkt-networking-proposal]: https://docs.google.com/a/coreos.com/document/d/1PUeV68q9muEmkHmRuW10HQ6cHgd4819_67pIxDRVNlM/edit#heading=h.ievko3xsjwxd
|
|
[rkt-networking-design]:
|
|
https://docs.google.com/a/coreos.com/document/d/1CTAL4gwqRofjxyp4tTkbgHtAwb2YCcP14UEbHNizd8g
|
|
[rkt-github]: https://github.com/coreos/rkt
|
|
[namespaces]: http://man7.org/linux/man-pages/man7/namespaces.7.html
|
|
[appc-github]: https://github.com/appc/spec
|
|
[docker]: https://docker.com
|
|
|
|
## General considerations
|
|
|
|
The intention is for the container runtime to first create a new network namespace for the container.
|
|
It then determines which networks this container should belong to and for each network, which plugin must be executed.
|
|
The network configuration is in JSON format and can easily be stored in a file.
|
|
The network configuration includes mandatory fields such as "name" and "type" as well as plugin (type) specific ones.
|
|
The network configuration allows for fields to change values between invocations. For this purpose there is an optional field "args" which should contain the varying information.
|
|
The container runtime sequentially sets up the networks by executing the corresponding plugin for each network.
|
|
Upon completion of the container lifecycle, the runtime executes the plugins in reverse order (relative to the order in which they were added) to disconnect them from the networks.
|
|
|
|
## CNI Plugin
|
|
|
|
### Overview
|
|
|
|
Each CNI plugin is implemented as an executable that is invoked by the container management system (e.g. rkt or Docker).
|
|
|
|
A CNI plugin is responsible for inserting a network interface into the container network namespace (e.g. one end of a veth pair) and making any necessary changes on the host (e.g. attaching other end of veth into a bridge).
|
|
It should then assign the IP to the interface and setup the routes consistent with IP Address Management section by invoking appropriate IPAM plugin.
|
|
|
|
### Parameters
|
|
|
|
The operations that the CNI plugin needs to support are:
|
|
|
|
|
|
- Add container to network
|
|
- Parameters:
|
|
- **Version**. The version of CNI spec that the caller is using (container management system or the invoking plugin).
|
|
- **Container ID**. This is optional but recommended, and should be unique across an administrative domain while the container is live (it may be reused in the future). For example, an environment with an IPAM system may require that each container is allocated a unique ID and that each IP allocation can thus be correlated back to a particular container. As another example, in appc implementations this would be the _pod ID_.
|
|
- **Network namespace path**. This represents the path to the network namespace to be added, i.e. /proc/[pid]/ns/net or a bind-mount/link to it.
|
|
- **Network configuration**. This is a JSON document describing a network to which a container can be joined. The schema is described below.
|
|
- **Extra arguments**. This provides an alternative mechanism to allow simple configuration of CNI plugins on a per-container basis.
|
|
- **Name of the interface inside the container**. This is the name that should be assigned to the interface created inside the container (network namespace); consequently it must comply with the standard Linux restrictions on interface names.
|
|
- Result:
|
|
- **IPs assigned to the interface**. This is either an IPv4 address, an IPv6 address, or both.
|
|
- **DNS information**. Dictionary that includes DNS information for nameservers, domain, search domains and options.
|
|
|
|
- Delete container from network
|
|
- Parameters:
|
|
- **Version**. The version of CNI spec that the caller is using (container management system or the invoking plugin).
|
|
- **Container ID**, as defined above.
|
|
- **Network namespace path**, as defined above.
|
|
- **Network configuration**, as defined above.
|
|
- **Extra arguments**, as defined above.
|
|
- **Name of the interface inside the container**, as defined above.
|
|
|
|
- Report version
|
|
- Parameters: NONE.
|
|
- Result: information about the CNI spec versions supported by the plugin
|
|
|
|
```
|
|
{
|
|
"cniVersion": "0.2.0", // the version of the CNI spec in use for this output
|
|
"supportedVersions": [ "0.1.0", "0.2.0" ] // the list of CNI spec versions that this plugin supports
|
|
}
|
|
```
|
|
|
|
The executable command-line API uses the type of network (see [Network Configuration](#network-configuration) below) as the name of the executable to invoke.
|
|
It will then look for this executable in a list of predefined directories. Once found, it will invoke the executable using the following environment variables for argument passing:
|
|
- `CNI_COMMAND`: indicates the desired operation; `ADD`, `DEL` or `VERSION`.
|
|
- `CNI_CONTAINERID`: Container ID
|
|
- `CNI_NETNS`: Path to network namespace file
|
|
- `CNI_IFNAME`: Interface name to set up
|
|
- `CNI_ARGS`: Extra arguments passed in by the user at invocation time. Alphanumeric key-value pairs separated by semicolons; for example, "FOO=BAR;ABC=123"
|
|
- `CNI_PATH`: Colon-separated list of paths to search for CNI plugin executables
|
|
|
|
Network configuration in JSON format is streamed to the plugin through stdin. This means it is not tied to a particular file on disk and can contain information which changes between invocations.
|
|
|
|
|
|
### Result
|
|
|
|
Success is indicated by a return code of zero and the following JSON printed to stdout in the case of the ADD command. This should be the same output as was returned by the IPAM plugin (see [IP Allocation](#ip-allocation) for details).
|
|
|
|
```
|
|
{
|
|
"cniVersion": "0.2.0",
|
|
"ip4": {
|
|
"ip": <ipv4-and-subnet-in-CIDR>,
|
|
"gateway": <ipv4-of-the-gateway>, (optional)
|
|
"routes": <list-of-ipv4-routes> (optional)
|
|
},
|
|
"ip6": {
|
|
"ip": <ipv6-and-subnet-in-CIDR>,
|
|
"gateway": <ipv6-of-the-gateway>, (optional)
|
|
"routes": <list-of-ipv6-routes> (optional)
|
|
},
|
|
"dns": {
|
|
"nameservers": <list-of-nameservers> (optional)
|
|
"domain": <name-of-local-domain> (optional)
|
|
"search": <list-of-additional-search-domains> (optional)
|
|
"options": <list-of-options> (optional)
|
|
}
|
|
}
|
|
```
|
|
|
|
`cniVersion` specifies a [Semantic Version 2.0](http://semver.org) of CNI specification used by the plugin.
|
|
`dns` field contains a dictionary consisting of common DNS information that this network is aware of.
|
|
The result is returned in the same format as specified in the [configuration](#network-configuration).
|
|
The specification does not declare how this information must be processed by CNI consumers.
|
|
Examples include generating an `/etc/resolv.conf` file to be injected into the container filesystem or running a DNS forwarder on the host.
|
|
|
|
Errors are indicated by a non-zero return code and the following JSON being printed to stdout:
|
|
```
|
|
{
|
|
"cniVersion": "0.2.0",
|
|
"code": <numeric-error-code>,
|
|
"msg": <short-error-message>,
|
|
"details": <long-error-message> (optional)
|
|
}
|
|
```
|
|
|
|
`cniVersion` specifies a [Semantic Version 2.0](http://semver.org) of CNI specification used by the plugin.
|
|
Error codes 0-99 are reserved for well-known errors (see [Well-known Error Codes](#well-known-error-codes) section).
|
|
Values of 100+ can be freely used for plugin specific errors.
|
|
|
|
In addition, stderr can be used for unstructured output such as logs.
|
|
|
|
### Network Configuration
|
|
|
|
The network configuration is described in JSON form. The configuration can be stored on disk or generated from other sources by the container runtime. The following fields are well-known and have the following meaning:
|
|
- `cniVersion` (string): [Semantic Version 2.0](http://semver.org) of CNI specification to which this configuration conforms.
|
|
- `name` (string): Network name. This should be unique across all containers on the host (or other administrative domain).
|
|
- `type` (string): Refers to the filename of the CNI plugin executable.
|
|
- `args` (dictionary): Optional additional arguments provided by the container runtime. For example a dictionary of labels could be passed to CNI plugins by adding them to a labels field under `args`.
|
|
- `ipMasq` (boolean): Optional (if supported by the plugin). Set up an IP masquerade on the host for this network. This is necessary if the host will act as a gateway to subnets that are not able to route to the IP assigned to the container.
|
|
- `ipam`: Dictionary with IPAM specific values:
|
|
- `type` (string): Refers to the filename of the IPAM plugin executable.
|
|
- `routes` (list): List of subnets (in CIDR notation) that the CNI plugin should ensure are reachable by routing them through the network. Each entry is a dictionary containing:
|
|
- `dst` (string): subnet in CIDR notation
|
|
- `gw` (string): IP address of the gateway to use. If not specified, the default gateway for the subnet is assumed (as determined by the IPAM plugin).
|
|
- `dns`: Dictionary with DNS specific values:
|
|
- `nameservers` (list of strings): list of a priority-ordered list of DNS nameservers that this network is aware of. Each entry in the list is a string containing either an IPv4 or an IPv6 address.
|
|
- `domain` (string): the local domain used for short hostname lookups.
|
|
- `search` (list of strings): list of priority ordered search domains for short hostname lookups. Will be preferred over `domain` by most resolvers.
|
|
- `options` (list of strings): list of options that can be passed to the resolver
|
|
|
|
Plugins may define additional fields that they accept and may generate an error if called with unknown fields. The exception to this is the `args` field may be used to pass arbitrary data which may be ignored by plugins.
|
|
### Example configurations
|
|
|
|
```json
|
|
{
|
|
"cniVersion": "0.2.0",
|
|
"name": "dbnet",
|
|
"type": "bridge",
|
|
// type (plugin) specific
|
|
"bridge": "cni0",
|
|
"ipam": {
|
|
"type": "host-local",
|
|
// ipam specific
|
|
"subnet": "10.1.0.0/16",
|
|
"gateway": "10.1.0.1"
|
|
},
|
|
"dns": {
|
|
"nameservers": [ "10.1.0.1" ]
|
|
}
|
|
}
|
|
```
|
|
|
|
```json
|
|
{
|
|
"cniVersion": "0.2.0",
|
|
"name": "pci",
|
|
"type": "ovs",
|
|
// type (plugin) specific
|
|
"bridge": "ovs0",
|
|
"vxlanID": 42,
|
|
"ipam": {
|
|
"type": "dhcp",
|
|
"routes": [ { "dst": "10.3.0.0/16" }, { "dst": "10.4.0.0/16" } ]
|
|
}
|
|
// args may be ignored by plugins
|
|
"args": {
|
|
"labels" : {
|
|
"appVersion" : "1.0"
|
|
}
|
|
}
|
|
}
|
|
```
|
|
|
|
```json
|
|
{
|
|
"cniVersion": "0.1",
|
|
"name": "wan",
|
|
"type": "macvlan",
|
|
// ipam specific
|
|
"ipam": {
|
|
"type": "dhcp",
|
|
"routes": [ { "dst": "10.0.0.0/8", "gw": "10.0.0.1" } ]
|
|
},
|
|
"dns": {
|
|
"nameservers": [ "10.0.0.1" ]
|
|
}
|
|
}
|
|
```
|
|
|
|
|
|
### IP Allocation
|
|
|
|
As part of its operation, a CNI plugin is expected to assign (and maintain) an IP address to the interface and install any necessary routes relevant for that interface. This gives the CNI plugin great flexibility but also places a large burden on it. Many CNI plugins would need to have the same code to support several IP management schemes that users may desire (e.g. dhcp, host-local).
|
|
|
|
To lessen the burden and make IP management strategy be orthogonal to the type of CNI plugin, we define a second type of plugin -- IP Address Management Plugin (IPAM plugin). It is however the responsibility of the CNI plugin to invoke the IPAM plugin at the proper moment in its execution. The IPAM plugin is expected to determine the interface IP/subnet, Gateway and Routes and return this information to the "main" plugin to apply. The IPAM plugin may obtain the information via a protocol (e.g. dhcp), data stored on a local filesystem, the "ipam" section of the Network Configuration file or a combination of the above.
|
|
|
|
#### IP Address Management (IPAM) Interface
|
|
|
|
Like CNI plugins, the IPAM plugins are invoked by running an executable. The executable is searched for in a predefined list of paths, indicated to the CNI plugin via `CNI_PATH`. The IPAM Plugin receives all the same environment variables that were passed in to the CNI plugin. Just like the CNI plugin, IPAM receives the network configuration via stdin.
|
|
|
|
Success is indicated by a zero return code and the following JSON being printed to stdout (in the case of the ADD command):
|
|
|
|
```
|
|
{
|
|
"cniVersion": "0.2.0",
|
|
"ip4": {
|
|
"ip": <ipv4-and-subnet-in-CIDR>,
|
|
"gateway": <ipv4-of-the-gateway>, (optional)
|
|
"routes": <list-of-ipv4-routes> (optional)
|
|
},
|
|
"ip6": {
|
|
"ip": <ipv6-and-subnet-in-CIDR>,
|
|
"gateway": <ipv6-of-the-gateway>, (optional)
|
|
"routes": <list-of-ipv6-routes> (optional)
|
|
},
|
|
"dns": {
|
|
"nameservers": <list-of-nameservers> (optional)
|
|
"domain": <name-of-local-domain> (optional)
|
|
"search": <list-of-search-domains> (optional)
|
|
"options": <list-of-options> (optional)
|
|
}
|
|
}
|
|
```
|
|
|
|
`cniVersion` specifies a [Semantic Version 2.0](http://semver.org) of CNI specification used by the plugin.
|
|
`gateway` is the default gateway for this subnet, if one exists.
|
|
It does not instruct the CNI plugin to add any routes with this gateway: routes to add are specified separately via the `routes` field.
|
|
An example use of this value is for the CNI plugin to add this IP address to the linux-bridge to make it a gateway.
|
|
|
|
Each route entry is a dictionary with the following fields:
|
|
- `dst` (string): Destination subnet specified in CIDR notation.
|
|
- `gw` (string): IP of the gateway. If omitted, a default gateway is assumed (as determined by the CNI plugin).
|
|
|
|
The "dns" field contains a dictionary consisting of common DNS information.
|
|
- `nameservers` (list of strings): list of a priority-ordered list of DNS nameservers that this network is aware of. Each entry in the list is a string containing either an IPv4 or an IPv6 address.
|
|
- `domain` (string): the local domain used for short hostname lookups.
|
|
- `search` (list of strings): list of priority ordered search domains for short hostname lookups. Will be preferred over `domain` by most resolvers.
|
|
- `options` (list of strings): list of options that can be passed to the resolver
|
|
See [CNI Plugin Result](#result) section for more information.
|
|
|
|
Errors and logs are communicated in the same way as the CNI plugin. See [CNI Plugin Result](#result) section for details.
|
|
|
|
IPAM plugin examples:
|
|
- **host-local**: Select an unused (by other containers on the same host) IP within the specified range.
|
|
- **dhcp**: Use DHCP protocol to acquire and maintain a lease. The DHCP requests will be sent via the created container interface; therefore, the associated network must support broadcast.
|
|
|
|
#### Notes
|
|
- Routes are expected to be added with a 0 metric.
|
|
- A default route may be specified via "0.0.0.0/0". Since another network might have already configured the default route, the CNI plugin should be prepared to skip over its default route definition.
|
|
|
|
## Well-known Error Codes
|
|
- `1` - Incompatible CNI version
|
|
- `2` - Unsupported field in network configuration. The error message must contain the key and value of the unsupported field. |