Skip to content

Commit 295008c

Browse files
authored
Fix linkerd-cni when using native sidecars (#362)
Fixes linkerd/linkerd2#11597 When the cni plugin is triggered, it validates that the proxy has been injected into the pod before setting up the iptables rules. It does so by looking for the "linkerd-proxy" container. However, when the proxy is injected as a native sidecar, it gets added as an _init_ container, so it was being disregarded here. We don't have integration tests for validating native sidecars when using linkerd-cni because [Calico doesn't work in k3s since k8s 1.27](k3d-io/k3d#1375), and we require k8s 1.29 for using native sidecars. I did nevertheless successfully test this fix in an AKS cluster.
1 parent 0b455de commit 295008c

File tree

1 file changed

+18
-9
lines changed

1 file changed

+18
-9
lines changed

cni-plugin/main.go

+18-9
Original file line numberDiff line numberDiff line change
@@ -193,14 +193,6 @@ func cmdAdd(args *skel.CmdArgs) error {
193193
return err
194194
}
195195

196-
containsLinkerdProxy := false
197-
for _, container := range pod.Spec.Containers {
198-
if container.Name == "linkerd-proxy" {
199-
containsLinkerdProxy = true
200-
break
201-
}
202-
}
203-
204196
containsInitContainer := false
205197
for _, container := range pod.Spec.InitContainers {
206198
if container.Name == "linkerd-init" {
@@ -209,7 +201,7 @@ func cmdAdd(args *skel.CmdArgs) error {
209201
}
210202
}
211203

212-
if containsLinkerdProxy && !containsInitContainer {
204+
if !containsInitContainer && containsLinkerdProxy(&pod.Spec) {
213205
logEntry.Debugf("linkerd-cni: setting up iptables firewall for %s/%s", namespace, pod)
214206
options := cmd.RootOptions{
215207
IncomingProxyPort: conf.ProxyInit.IncomingProxyPort,
@@ -366,6 +358,23 @@ func cmdDel(_ *skel.CmdArgs) error {
366358
return nil
367359
}
368360

361+
func containsLinkerdProxy(spec *v1.PodSpec) bool {
362+
for _, container := range spec.Containers {
363+
if container.Name == "linkerd-proxy" {
364+
return true
365+
}
366+
}
367+
368+
// native sidecar proxy
369+
for _, container := range spec.InitContainers {
370+
if container.Name == "linkerd-proxy" {
371+
return true
372+
}
373+
}
374+
375+
return false
376+
}
377+
369378
func getAPIServerPorts(ctx context.Context, api *kubernetes.Clientset) ([]string, error) {
370379
service, err := api.CoreV1().Services("default").Get(ctx, "kubernetes", metav1.GetOptions{})
371380
if err != nil {

0 commit comments

Comments
 (0)