mirror of
https://github.com/aljazceru/kata-containers.git
synced 2026-02-17 12:34:28 +01:00
Fixes: #7573 To enable this feature, build your rootfs using AGENT_POLICY=yes. The default is AGENT_POLICY=no. Building rootfs using AGENT_POLICY=yes has the following effects: 1. The kata-opa service gets included in the Guest image. 2. The agent gets built using AGENT_POLICY=yes. After this patch, the shim calls SetPolicy if and only if a Policy annotation is attached to the sandbox/pod. When creating a sandbox/pod that doesn't have an attached Policy annotation: 1. If the agent was built using AGENT_POLICY=yes, the new sandbox uses the default agent settings, that might include a default Policy too. 2. If the agent was built using AGENT_POLICY=no, the new sandbox is executed the same way as before this patch. Any SetPolicy calls from the shim to the agent fail if the agent was built using AGENT_POLICY=no. If the agent was built using AGENT_POLICY=yes: 1. The agent reads the contents of a default policy file during sandbox start-up. 2. The agent then connects to the OPA service on localhost and sends the default policy to OPA. 3. If the shim calls SetPolicy: a. The agent checks if SetPolicy is allowed by the current policy (the current policy is typically the default policy mentioned above). b. If SetPolicy is allowed, the agent deletes the current policy from OPA and replaces it with the new policy it received from the shim. A typical new policy from the shim doesn't allow any future SetPolicy calls. 4. For every agent rpc API call, the agent asks OPA if that call should be allowed. OPA allows or not a call based on the current policy, the name of the agent API, and the API call's inputs. The agent rejects any calls that are rejected by OPA. When building using AGENT_POLICY_DEBUG=yes, additional Policy logging gets enabled in the agent. In particular, information about the inputs for agent rpc API calls is logged in /tmp/policy.txt, on the Guest VM. These inputs can be useful for investigating API calls that might have been rejected by the Policy. Examples: 1. Load a failing policy file test1.rego on a different machine: opa run --server --addr 127.0.0.1:8181 test1.rego 2. Collect the API inputs from Guest's /tmp/policy.txt and test on the machine where the failing policy has been loaded: curl -X POST http://localhost:8181/v1/data/agent_policy/CreateContainerRequest \ --data-binary @test1-inputs.json Signed-off-by: Dan Mihai <dmihai@microsoft.com>
215 lines
9.0 KiB
Go
215 lines
9.0 KiB
Go
// Copyright (c) 2016 Intel Corporation
|
|
//
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
//
|
|
|
|
package virtcontainers
|
|
|
|
import (
|
|
"syscall"
|
|
"time"
|
|
|
|
"context"
|
|
|
|
persistapi "github.com/kata-containers/kata-containers/src/runtime/virtcontainers/persist/api"
|
|
pbTypes "github.com/kata-containers/kata-containers/src/runtime/virtcontainers/pkg/agent/protocols"
|
|
"github.com/kata-containers/kata-containers/src/runtime/virtcontainers/pkg/agent/protocols/grpc"
|
|
"github.com/kata-containers/kata-containers/src/runtime/virtcontainers/types"
|
|
specs "github.com/opencontainers/runtime-spec/specs-go"
|
|
)
|
|
|
|
type newAgentFuncKey struct{}
|
|
|
|
type newAgentFuncType func() agent
|
|
|
|
// getAgentFunc used to pass mock agent creation func to CreateSandbox passed in `ctx`
|
|
func getNewAgentFunc(ctx context.Context) newAgentFuncType {
|
|
v := ctx.Value(newAgentFuncKey{})
|
|
if v != nil {
|
|
if vv, ok := v.(newAgentFuncType); ok {
|
|
return vv
|
|
}
|
|
}
|
|
return newKataAgent
|
|
}
|
|
|
|
// WithNewAgentFunc set newAgentFuncKey in `ctx`
|
|
func WithNewAgentFunc(ctx context.Context, f newAgentFuncType) context.Context {
|
|
return context.WithValue(ctx, newAgentFuncKey{}, f)
|
|
}
|
|
|
|
// agent is the virtcontainers agent interface.
|
|
// Agents are running in the guest VM and handling
|
|
// communications between the host and guest.
|
|
type agent interface {
|
|
// init is used to pass agent specific configuration to the agent implementation.
|
|
// agent implementations also will typically start listening for agent events from
|
|
// init().
|
|
// After init() is called, agent implementations should be initialized and ready
|
|
// to handle all other Agent interface methods.
|
|
init(ctx context.Context, sandbox *Sandbox, config KataAgentConfig) (disableVMShutdown bool, err error)
|
|
|
|
// capabilities should return a structure that specifies the capabilities
|
|
// supported by the agent.
|
|
capabilities() types.Capabilities
|
|
|
|
// check will check the agent liveness
|
|
check(ctx context.Context) error
|
|
|
|
// tell whether the agent is long live connected or not
|
|
longLiveConn() bool
|
|
|
|
// disconnect will disconnect the connection to the agent
|
|
disconnect(ctx context.Context) error
|
|
|
|
// get agent url
|
|
getAgentURL() (string, error)
|
|
|
|
// set agent url
|
|
setAgentURL() error
|
|
|
|
// update the agent using some elements from another agent
|
|
reuseAgent(agent agent) error
|
|
|
|
// createSandbox will tell the agent to perform necessary setup for a Sandbox.
|
|
createSandbox(ctx context.Context, sandbox *Sandbox) error
|
|
|
|
// exec will tell the agent to run a command in an already running container.
|
|
exec(ctx context.Context, sandbox *Sandbox, c Container, cmd types.Cmd) (*Process, error)
|
|
|
|
// startSandbox will tell the agent to start all containers related to the Sandbox.
|
|
startSandbox(ctx context.Context, sandbox *Sandbox) error
|
|
|
|
// stopSandbox will tell the agent to stop all containers related to the Sandbox.
|
|
stopSandbox(ctx context.Context, sandbox *Sandbox) error
|
|
|
|
// createContainer will tell the agent to create a container related to a Sandbox.
|
|
createContainer(ctx context.Context, sandbox *Sandbox, c *Container) (*Process, error)
|
|
|
|
// startContainer will tell the agent to start a container related to a Sandbox.
|
|
startContainer(ctx context.Context, sandbox *Sandbox, c *Container) error
|
|
|
|
// stopContainer will tell the agent to stop a container related to a Sandbox.
|
|
stopContainer(ctx context.Context, sandbox *Sandbox, c Container) error
|
|
|
|
// signalProcess will tell the agent to send a signal to a
|
|
// container or a process related to a Sandbox. If all is true, all processes in
|
|
// the container will be sent the signal.
|
|
signalProcess(ctx context.Context, c *Container, processID string, signal syscall.Signal, all bool) error
|
|
|
|
// winsizeProcess will tell the agent to set a process' tty size
|
|
winsizeProcess(ctx context.Context, c *Container, processID string, height, width uint32) error
|
|
|
|
// writeProcessStdin will tell the agent to write a process stdin
|
|
writeProcessStdin(ctx context.Context, c *Container, ProcessID string, data []byte) (int, error)
|
|
|
|
// closeProcessStdin will tell the agent to close a process stdin
|
|
closeProcessStdin(ctx context.Context, c *Container, ProcessID string) error
|
|
|
|
// readProcessStdout will tell the agent to read a process stdout
|
|
readProcessStdout(ctx context.Context, c *Container, processID string, data []byte) (int, error)
|
|
|
|
// readProcessStderr will tell the agent to read a process stderr
|
|
readProcessStderr(ctx context.Context, c *Container, processID string, data []byte) (int, error)
|
|
|
|
// updateContainer will update the resources of a running container
|
|
updateContainer(ctx context.Context, sandbox *Sandbox, c Container, resources specs.LinuxResources) error
|
|
|
|
// waitProcess will wait for the exit code of a process
|
|
waitProcess(ctx context.Context, c *Container, processID string) (int32, error)
|
|
|
|
// onlineCPUMem will online CPUs and Memory inside the Sandbox.
|
|
// This function should be called after hot adding vCPUs or Memory.
|
|
// cpus specifies the number of CPUs that should be onlined in the guest, and special value 0 means agent will skip this check.
|
|
// cpuOnly specifies that we should online cpu or online memory or both
|
|
onlineCPUMem(ctx context.Context, cpus uint32, cpuOnly bool) error
|
|
|
|
// memHotplugByProbe will notify the guest kernel about memory hotplug event through
|
|
// probe interface.
|
|
// This function should be called after hot adding Memory and before online memory.
|
|
// addr specifies the address of the recently hotplugged or unhotplugged memory device.
|
|
memHotplugByProbe(ctx context.Context, addr uint64, sizeMB uint32, memorySectionSizeMB uint32) error
|
|
|
|
// statsContainer will tell the agent to get stats from a container related to a Sandbox
|
|
statsContainer(ctx context.Context, sandbox *Sandbox, c Container) (*ContainerStats, error)
|
|
|
|
// pauseContainer will pause a container
|
|
pauseContainer(ctx context.Context, sandbox *Sandbox, c Container) error
|
|
|
|
// resumeContainer will resume a paused container
|
|
resumeContainer(ctx context.Context, sandbox *Sandbox, c Container) error
|
|
|
|
// removeStaleVirtiofsShareMounts will tell the agent to remove stale virtiofs share mounts in the guest.
|
|
removeStaleVirtiofsShareMounts(ctx context.Context) error
|
|
|
|
// configure will update agent settings based on provided arguments
|
|
configure(ctx context.Context, h Hypervisor, id, sharePath string, config KataAgentConfig) error
|
|
|
|
// configureFromGrpc will update agent settings based on provided arguments which from Grpc
|
|
configureFromGrpc(ctx context.Context, h Hypervisor, id string, config KataAgentConfig) error
|
|
|
|
// reseedRNG will reseed the guest random number generator
|
|
reseedRNG(ctx context.Context, data []byte) error
|
|
|
|
// updateInterface will tell the agent to update a nic for an existed Sandbox.
|
|
updateInterface(ctx context.Context, inf *pbTypes.Interface) (*pbTypes.Interface, error)
|
|
|
|
// listInterfaces will tell the agent to list interfaces of an existed Sandbox
|
|
listInterfaces(ctx context.Context) ([]*pbTypes.Interface, error)
|
|
|
|
// updateEphemeralMounts will tell the agent to update tmpfs mounts in the Sandbox.
|
|
updateEphemeralMounts(ctx context.Context, storages []*grpc.Storage) error
|
|
|
|
// updateRoutes will tell the agent to update route table for an existed Sandbox.
|
|
updateRoutes(ctx context.Context, routes []*pbTypes.Route) ([]*pbTypes.Route, error)
|
|
|
|
// listRoutes will tell the agent to list routes of an existed Sandbox
|
|
listRoutes(ctx context.Context) ([]*pbTypes.Route, error)
|
|
|
|
// getGuestDetails will tell the agent to get some information of guest
|
|
getGuestDetails(context.Context, *grpc.GuestDetailsRequest) (*grpc.GuestDetailsResponse, error)
|
|
|
|
// setGuestDateTime asks the agent to set guest time to the provided one
|
|
setGuestDateTime(context.Context, time.Time) error
|
|
|
|
// copyFile copies file from host to container's rootfs
|
|
copyFile(ctx context.Context, src, dst string) error
|
|
|
|
// Tell the agent to setup the swapfile in the guest
|
|
addSwap(ctx context.Context, PCIPath types.PciPath) error
|
|
|
|
// markDead tell agent that the guest is dead
|
|
markDead(ctx context.Context)
|
|
|
|
// cleanup removes all on disk information generated by the agent
|
|
cleanup(ctx context.Context)
|
|
|
|
// return data for saving
|
|
save() persistapi.AgentState
|
|
|
|
// load data from disk
|
|
load(persistapi.AgentState)
|
|
|
|
// getOOMEvent will wait on OOM events that occur in the sandbox.
|
|
// Will return the ID of the container where the event occurred.
|
|
getOOMEvent(ctx context.Context) (string, error)
|
|
|
|
// getAgentMetrics get metrics of agent and guest through agent
|
|
getAgentMetrics(context.Context, *grpc.GetMetricsRequest) (*grpc.Metrics, error)
|
|
|
|
// getGuestVolumeStats get the filesystem stats of a volume specified by the volume mount path on the guest.
|
|
getGuestVolumeStats(ctx context.Context, volumeGuestPath string) ([]byte, error)
|
|
|
|
// resizeGuestVolume resizes a volume specified by the volume mount path on the guest.
|
|
resizeGuestVolume(ctx context.Context, volumeGuestPath string, size uint64) error
|
|
|
|
// getIPTables obtains the iptables from the guest
|
|
getIPTables(ctx context.Context, isIPv6 bool) ([]byte, error)
|
|
|
|
// setIPTables sets the iptables from the guest
|
|
setIPTables(ctx context.Context, isIPv6 bool, data []byte) error
|
|
|
|
// setPolicy sends a new policy to the guest agent
|
|
setPolicy(ctx context.Context, policy string) error
|
|
}
|