Extension conventions
There are three ways of passing information to plugins using the Container Network Interface (CNI), none of which require the spec to be updated. These are
- plugin specific fields in the JSON config
args
field in the JSON configCNI_ARGS
environment variable
This document aims to provide guidance on which method should be used and to provide a convention for how common information should be passed. Establishing these conventions allows plugins to work across multiple runtimes. This helps both plugins and the runtimes.
Plugins
- Plugin authors should aim to support these conventions where it makes sense for their plugin. This means they are more likely to “just work” with a wider range of runtimes.
- Plugins should accept arguments according to these conventions if they implement the same basic functionality as other plugins. If plugins have shared functionality that isn’t covered by these conventions then a PR should be opened against this document.
Runtimes
- Runtime authors should follow these conventions if they want to pass additional information to plugins. This will allow the extra information to be consumed by the widest range of plugins.
- These conventions serve as an abstraction for the runtime. For example, port forwarding is highly implementation specific, but users should be able to select the plugin of their choice without changing the runtime.
Current conventions
Additional conventions can be created by creating PRs which modify this document.
Dynamic Plugin specific fields (Capabilities / Runtime Configuration)
Plugin specific fields formed part of the original CNI spec and have been present since the initial release.
Plugins may define additional fields that they accept and may generate an error if called with unknown fields. The exception to this is the args field may be used to pass arbitrary data which may be ignored by plugins.
A plugin can define any additional fields it needs to work properly. It should return an error if it can’t act on fields that were expected or where the field values were malformed.
This method of passing information to a plugin is recommended when the following conditions hold:
- The configuration has specific meaning to the plugin (i.e. it’s not just general meta data)
- the plugin is expected to act on the configuration or return an error if it can’t
Dynamic information (i.e. data that a runtime fills out) should be placed in a runtimeConfig
section. Plugins can request
that the runtime insert this dynamic configuration by explicitly listing their capabilities
in the network configuration.
For example, the configuration for a port mapping plugin might look like this to an operator (it should be included as part of a network configuration list .
{
"name" : "ExamplePlugin",
"type" : "port-mapper",
"capabilities": {"portMappings": true}
}
But the runtime would fill in the mappings so the plugin itself would receive something like this.
{
"name" : "ExamplePlugin",
"type" : "port-mapper",
"runtimeConfig": {
"portMappings": [
{"hostPort": 8080, "containerPort": 80, "protocol": "tcp"}
]
}
}
Well-known Capabilities
Area | Purpose | Capability | Spec and Example | Runtime implementations | Plugin Implementations |
---|---|---|---|---|---|
port mappings | Pass mapping from ports on the host to ports in the container network namespace. | portMappings | A list of portmapping entries. [ { “hostPort”: 8080, “containerPort”: 80, “protocol”: “tcp” }, { “hostPort”: 8000, “containerPort”: 8001, “protocol”: “udp” } ] | kubernetes | CNI portmap plugin |
ip ranges | Dynamically configure the IP range(s) for address allocation. Runtimes that manage IP pools, but not individual IP addresses, can pass these to plugins. | ipRanges | The same as the ranges key for host-local - a list of lists of subnets. The outer list is the number of IPs to allocate, and the inner list is a pool of subnets for each allocation. [ [ { “subnet”: “10.1.2.0/24”, “rangeStart”: “10.1.2.3”, “rangeEnd”: 10.1.2.99", “gateway”: “10.1.2.254” } ]] | none | CNI host-local plugin |
bandwidth limits | Dynamically configure interface bandwidth limits | bandwidth | Desired bandwidth limits. Rates are in bits per second, burst values are in bits. { “ingressRate”: 2048, “ingressBurst”: 1600, “egressRate”: 4096, “egressBurst”: 1600 } | none | CNI bandwidth plugin |
dns | Dynamically configure dns according to runtime | dns | Dictionary containing a list of servers (string entries), a list of searches (string entries), a list of options (string entries). { “searches” : [ “internal.yoyodyne.net”, “corp.tyrell.net” ] “servers”: [ “8.8.8.8”, “10.0.0.10” ] } | kubernetes | CNI win-bridge plugin, CNI win-overlay plugin |
ips | Dynamically allocate IPs for container interface. Runtime which has the ability of address allocation can pass these to plugins. | ips | A list of IP (string entries). [ “10.10.0.1/24”, “3ffe:ffff:0:01ff::1/64” ] | none | CNI static plugin |
mac | Dynamically assign MAC. Runtime can pass this to plugins which need MAC as input. | mac | MAC (string entry). “c2:11:22:33:44:55” | none | CNI tuning plugin |
infiniband guid | Dynamically assign Infiniband GUID to network interface. Runtime can pass this to plugins which need Infiniband GUID as input. | infinibandGUID | GUID (string entry). “c2:11:22:33:44:55:66:77” | none | CNI
ib-sriov-cni plugin |
device id | Provide device identifier which is associated with the network to allow the CNI plugin to perform device dependent network configurations. | deviceID | deviceID (string entry). “0000:04:00.5” | none | CNI host-device plugin |
aliases | Provide a list of names that will be mapped to the IP addresses assigned to this interface. Other containers on the same network may use one of these names to access the container. | aliases | List of alias (string entry). [“my-container”, “primary-db”] | none | CNI alias plugin |
“args” in network config
args
in
network config were reserved as a field in the 0.2.0
release of the CNI spec.
args (dictionary): Optional additional arguments provided by the container runtime. For example a dictionary of labels could be passed to CNI plugins by adding them to a labels field under args.
args
provide a way of providing more structured data than the flat strings that CNI_ARGS can support.
args
should be used for optional meta-data. Runtimes can place additional data in args
and plugins that don’t understand that data should just ignore it. Runtimes should not require that a plugin understands or consumes that data provided, and so a runtime should not expect to receive an error if the data could not be acted on.
This method of passing information to a plugin is recommended when the information is optional and the plugin can choose to ignore it. It’s often that case that such information is passed to all plugins by the runtime without regard for whether the plugin can understand it.
The conventions documented here are all namespaced under cni
so they don’t conflict with any existing args
.
For example:
{
"cniVersion":"0.2.0",
"name":"net",
"args":{
"cni":{
"labels": [{"key": "app", "value": "myapp"}]
}
},
// <REST OF CNI CONFIG HERE>
"ipam":{
// <IPAM CONFIG HERE>
}
}
Area | Purpose | Spec and Example | Runtime implementations | Plugin Implementations |
---|---|---|---|---|
labels | Passkey=value labels to plugins | “labels” : [ { “key” : “app”, “value” : “myapp” }, { “key” : “env”, “value” : “prod” }] | none | none |
ips | Request static IPs | Spec:“ips”: ["<ip>[/<prefix>]", …]Examples:“ips”: [“10.2.2.42/24”, “2001:db8::5”]The plugin may require the IP address to include a prefix length. | none | host-local |
CNI_ARGS
CNI_ARGS formed part of the original CNI spec and have been present since the initial release.
CNI_ARGS
: Extra arguments passed in by the user at invocation time. Alphanumeric key-value pairs separated by semicolons; for example, “FOO=BAR;ABC=123”
The use of CNI_ARGS
is deprecated and “args” should be used instead. If a runtime passes an equivalent key via args
(eg the ips
args
Area and the CNI_ARGS
IP
Field) and the plugin understands args
, the plugin must ignore the CNI_ARGS Field.
Field | Purpose | Spec and Example | Runtime implementations | Plugin Implementations |
---|---|---|---|---|
IP | Request a specific IP from IPAM plugins | Spec:IP=<ip>[/<prefix>]Example: IP=192.168.10.4/24The plugin may require the IP addresses to include a prefix length. | rkt supports passing additional arguments to plugins and the documentation suggests IP can be used. | host-local (since version v0.2.0) supports the field for IPv4 only - documentation . |
Chained Plugins
If plugins are agnostic about the type of interface created, they SHOULD work in a chained mode and configure existing interfaces. Plugins MAY also create the desired interface when not run in a chain.
For example, the bridge
plugin adds the host-side interface to a bridge. So, it should accept any previous result that includes a host-side interface, including tap
devices. If not called as a chained plugin, it creates a veth
pair first.
Plugins that meet this convention are usable by a larger set of runtimes and interfaces, including hypervisors and DPDK providers.