首页 > 代码库 > ClearContainer 网络部分源码分析
ClearContainer 网络部分源码分析
// cc-oci-runtime/src/oci.c
/*!
* Create the state file, apply mounts and run hooks, but do not start the VM
*/
gboolean cc_oci_create(struct cc_oci_config *config)
(1)、依次调用cc_oci_config_file_parse(config),cc_oci_config_check(config),cc_oci_runtime_dir_setup(config)和cc_oci_handle_mounts(config)
(2)、当cc_pod_is_vm(config)为true时,调用cc_oci_vm_launch(config),否则调用cc_pod_container_create(config)
// cc-oci-runtime/src/process.c
/*!
* Start the hypervisor as a child process.
* Due to the way networking is handled in Docker, the logic here is unfortunately rather complex.
* \param config \ref cc_oci_config.
* \return \c true on success, else \c false.
*/
gboolean cc_oci_vm_launch(struct cc_oci_config *config)
(1)、调用setup_networking = cc_oci_enable_networking(); --->仅仅只是确定是否是root,因为要创建interface
...
(2)、调用config->state.status = OCI_STATUS_CREATED;
/* The namespace setup occurs in the parent to ensure the hooks run successfully. The child will
* automatically inherit the namespaces.
*/
(3)、调用cc_oci_ns_setup(config)
/* Connect to the proxy before launching the shim so that the proxy socket fd can be passed to the shim*/
(4)、调用cc_proxy_connect(config->proxy)
/* Set up comms channels to the child:
* - one to pass the full list of expanded hypervisor arguments.
* - one to allow detection of successful child setup: if the child closes the pipe,
* it was successful, but if it writes data to the pipe, setup failed.
*/
(5)、调用pipe2(child_err_pipe, O_CLOEXEC)和pipe2(hypervisor_args_pipe, O_CLOEXEC)
(6)、fork()一个子进程,在子进程中最终运行cc_oci_setup_child(config)以及execvp(args[0], args)
....
/* Run the pre-start hooks.
* Note that one of these hooks will configure the networking in the network namespace.
* If a hook returns a non-zero exit code, then an error including the exit code and the stderr is
* returned to the caller and the container is torn down.
*/
(7)、hook_status = cc_run_hooks(config->oci.hooks.prestart, config->state.state_file_path, true)
// add network config bits to following functions:
// - cc_oci_container_state()
// - oci_state()
// - cc_oci_update_options()
(8)、如果setup_networking为true,则依次调用hndl = netlink_init(),cc_oci_vm_netcfg_get(config, hndl)和cc_oci_network_create(config, hndl)
.......
// cc-oci-runtime/src/netlink.c
/*!
* Setup the netlink socket to use with netlink transactions.This handle should be used for all netlink
* transactions for a given thread.
*/
struct netlink_handle *netlink_init(void)
初始化一个netlink_handle实例
// cc-oci-runtime/src/process.c
/*!
* Obtain the network configuration by quering the network namespace.
* \param[in, out] config \ref cc_oci_config.
* \param hndl handle returned from a call to \ref netlink_init().
*/
private gboolean cc_oci_vm_netcfg_get(struct cc_oci_config *config, struct netlink_handle *hndl)
仅仅调用cc_oci_network_discover(config, hndl)
// cc-oci-runtime/src/networking.c
/*!
* Obtain the networking configuration of the container
* Currently done by scanned the namespace
* Ideally the OCI spec should be modified such that
* these parameters are sent to the runtime
*/
gboolean cc_oci_network_discover(struct cc_oci_config *const config, struct netlink_handle *hndl)
...
(1)、调用getifaddrs(&ifaddrs) --> discover container interfaces
....
/*!
* Request to create the networking framework that will be used to
* connect the specified container network(veth) to the VM
*
* The container may be associated with multiple networks and function has to be invoked
* for each of those networks
* Once the OCI spec supports the creation of VM compatible tap interfaces in the network plugin
* this setup will not be required
*/
gboolean cc_oci_network_create(const struct cc_oci_config *const config, struct netlink_handle *const hndl)
/* Each container has its own namespace. Hence we use the same mac address prefix
* for tap interfaces on the host side. This method scales to support upto 2^16 networks
*/
遍历config->net.interfaces,
// cc-oci-runtime/src/namespace.c
/**
* Setup namespace.
* This should not strictly be required (since the runtime does not implement a "traditional linux" container).
* Howerver, namespace are used to pass network configuration to the runtime so the network namespace
* must be supported.
* \param config \ref cc_oci_config.
* \return \c true on success, else \c false.
* \todo Show the namespace path. For unshare, the strategy should be to call cc_oci_resolve_path (),
* passing it the value of ."/proc/self/ns/%s". The complication is that %s does *NOT* match the
* namespace names chosen by OCI, hence oci_ns_map will need to be extended to add a "gchar *proc_name" element
* \note in the case of error, check the value of errno immediately after this call to determine the reason.
*/
gooblean cc_oci_ns_setup(struct cc_oci_config *config)
从config中解析出network space的ns->path,并调用fd = open(ns->path, O_RDONLY),最后调用setns(fd, ns->type)加入该network namespace
ClearContainer 网络部分源码分析