Handle advanced --network options in podman play kube

Since Podman create/run can support this, so should play.

Fixes: https://github.com/containers/podman/issues/10807

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
This commit is contained in:
Daniel J Walsh 2021-06-29 14:18:46 -04:00
parent 61b7beaf8e
commit 092902b455
No known key found for this signature in database
GPG Key ID: A2DF901DABE2C028
4 changed files with 50 additions and 19 deletions

View File

@ -2,7 +2,6 @@ package common
import ( import (
"net" "net"
"strings"
"github.com/containers/common/pkg/completion" "github.com/containers/common/pkg/completion"
"github.com/containers/podman/v3/cmd/podman/parse" "github.com/containers/podman/v3/cmd/podman/parse"
@ -204,17 +203,13 @@ func NetFlagsToNetOptions(cmd *cobra.Command, netnsFromConfig bool) (*entities.N
return nil, err return nil, err
} }
parts := strings.SplitN(network, ":", 2) ns, cniNets, options, err := specgen.ParseNetworkString(network)
ns, cniNets, err := specgen.ParseNetworkNamespace(network, containerConfig.Containers.RootlessNetworking == "cni")
if err != nil { if err != nil {
return nil, err return nil, err
} }
if len(parts) > 1 { if len(options) > 0 {
opts.NetworkOptions = make(map[string][]string) opts.NetworkOptions = options
opts.NetworkOptions[parts[0]] = strings.Split(parts[1], ",")
cniNets = nil
} }
opts.Network = ns opts.Network = ns
opts.CNINetworks = cniNets opts.CNINetworks = cniNets

View File

@ -182,20 +182,22 @@ func (ic *ContainerEngine) playKubePod(ctx context.Context, podName string, podY
return nil, err return nil, err
} }
if options.Network != "" { if options.Network != "" {
switch strings.ToLower(options.Network) { ns, cniNets, netOpts, err := specgen.ParseNetworkString(options.Network)
case "bridge", "host": if err != nil {
return nil, err
}
if (ns.IsBridge() && len(cniNets) == 0) || ns.IsHost() {
return nil, errors.Errorf("invalid value passed to --network: bridge or host networking must be configured in YAML") return nil, errors.Errorf("invalid value passed to --network: bridge or host networking must be configured in YAML")
case "": }
return nil, errors.Errorf("invalid value passed to --network: must provide a comma-separated list of CNI networks") logrus.Debugf("Pod %q joining CNI networks: %v", podName, cniNets)
default: p.NetNS.NSMode = specgen.Bridge
// We'll assume this is a comma-separated list of CNI p.CNINetworks = append(p.CNINetworks, cniNets...)
// networks. if len(netOpts) > 0 {
networks := strings.Split(options.Network, ",") p.NetworkOptions = netOpts
logrus.Debugf("Pod joining CNI networks: %v", networks)
p.NetNS.NSMode = specgen.Bridge
p.CNINetworks = append(p.CNINetworks, networks...)
} }
} }
if len(options.StaticIPs) > *ipIndex { if len(options.StaticIPs) > *ipIndex {
p.StaticIP = &options.StaticIPs[*ipIndex] p.StaticIP = &options.StaticIPs[*ipIndex]
} else if len(options.StaticIPs) > 0 { } else if len(options.StaticIPs) > 0 {

View File

@ -68,6 +68,11 @@ func (n *Namespace) IsHost() bool {
return n.NSMode == Host return n.NSMode == Host
} }
// IsBridge returns a bool if the namespace is a Bridge
func (n *Namespace) IsBridge() bool {
return n.NSMode == Bridge
}
// IsPath indicates via bool if the namespace is based on a path // IsPath indicates via bool if the namespace is based on a path
func (n *Namespace) IsPath() bool { func (n *Namespace) IsPath() bool {
return n.NSMode == Path return n.NSMode == Path
@ -301,3 +306,20 @@ func ParseNetworkNamespace(ns string, rootlessDefaultCNI bool) (Namespace, []str
return toReturn, cniNetworks, nil return toReturn, cniNetworks, nil
} }
func ParseNetworkString(network string) (Namespace, []string, map[string][]string, error) {
var networkOptions map[string][]string
parts := strings.SplitN(network, ":", 2)
ns, cniNets, err := ParseNetworkNamespace(network, containerConfig.Containers.RootlessNetworking == "cni")
if err != nil {
return Namespace{}, nil, nil, err
}
if len(parts) > 1 {
networkOptions = make(map[string][]string)
networkOptions[parts[0]] = strings.Split(parts[1], ",")
cniNets = nil
}
return ns, cniNets, networkOptions, nil
}

View File

@ -89,6 +89,18 @@ RELABEL="system_u:object_r:container_file_t:s0"
run_podman pod rm -f test_pod run_podman pod rm -f test_pod
} }
@test "podman play --network" {
TESTDIR=$PODMAN_TMPDIR/testdir
mkdir -p $TESTDIR
echo "$testYaml" | sed "s|TESTDIR|${TESTDIR}|g" > $PODMAN_TMPDIR/test.yaml
run_podman 125 play kube --network bridge $PODMAN_TMPDIR/test.yaml
is "$output" ".*invalid value passed to --network: bridge or host networking must be configured in YAML" "podman plan-network should fail wth --network host"
run_podman 125 play kube --network host $PODMAN_TMPDIR/test.yaml
is "$output" ".*invalid value passed to --network: bridge or host networking must be configured in YAML" "podman plan-network should fail wth --network host"
run_podman play kube --network slirp4netns:port_handler=slirp4netns $PODMAN_TMPDIR/test.yaml
run_podman pod rm -f test_pod
}
@test "podman play with user from image" { @test "podman play with user from image" {
TESTDIR=$PODMAN_TMPDIR/testdir TESTDIR=$PODMAN_TMPDIR/testdir
mkdir -p $TESTDIR mkdir -p $TESTDIR