Skip to content

Control interface

The control interface allows the workload developers to easily integrate the communication between the Ankaios system and their applications.

Note

The control interface is currently only available for workloads using the podman runtime and not for the podman-kube runtime.

Overview

flowchart TD
    a1(Ankaios Agent 1)
    w1(Workload 1)
    w2(Workload 2)
    a2(Ankaios Agent 2)
    w3(Workload 3)
    w4(Workload 4)
    s(Ankaios server)


    s <--> a1 <-->|Control Interface| w1 & w2
    s <--> a2 <-->|Control Interface| w3 & w4

The control interface enables a workload to communicate with the Ankaios system by interacting with the Ankaios server through writing/reading communication data to/from the provided FIFO files in the FIFO mount point.

Authorization

Ankaios checks for each request from a workload to the control interface, if the workload is authorized. The authorization is configured for each workload using controlInterfaceAccess. A workload without controlInterfaceAccess configuration is denied all actions on the control interface. The authorization configuration consists of allow and deny rules. Each rule defines the operation (e.g. read) the workload is allowed to execute and with which filter masks it is allowed to execute this operation.

A filter mask describes a path in the CompleteState object. The segments of the path are divided by the '.' symbol. Segments can also be the wildcard character '*', indicating this segment shall match every possible field. E.g. desiredState.workloads.*.tag allows access to the tags of all workloads.

In an allow rule the path gives access to the exact path and also all subfields. E.g. an allow rule with desiredState.workloads.example would also give access to desiredState.workload.example.tags. In a deny rule the path prohibits access to the exact path and also all parent fields. E.g. a deny rule with desiredState.workloads.example would also deny access to desiredState.workloads, but has no effect on desiredState.workloads.other_example.

Every request not allowed by a rule in controlInterfaceAccess is prohibited. Every request allowed by a rule, but denied by another rule is also prohibited. E.g. with an allow rule for path desiredState.workloads.*.agent and a deny rule for desiredState.workloads.controller, a workload would be allowed to change the agent of each workload, except for the controller workload.

FIFO mount point

flowchart TD
    a1(Ankaios Agent 1)
    w1(Workload 1)
    w2(Workload 2)
    s(Ankaios server)


    s <--> a1 <-->|"/run/ankaios/control_interface/{input,output}"| w1 & w2

The control interface relies on FIFO (also known as named pipes) to enable a workload to communicate with the Ankaios system. For that purpose, Ankaios creates a mount point for each workload to store the FIFO files. At the mount point /run/ankaios/control_interface/ the workload developer can find the FIFO files input and output and use them for the communication with the Ankaios server. Ankaios uses its own communication protocol described in protocol documentation as a protobuf IDL which allows the client code to be generated in any programming language supported by the protobuf compiler. The generated client code can then be integrated and used in a workload.

Communication between Ankaios and workloads

flowchart TD
    proto("ankaios.proto")
    gen_code("Generated Client Code")
    workload("Workload")

    proto -->|generate code with protoc| gen_code
    workload-->|uses| gen_code

In order to enable the communication between a workload and the Ankaios system, the workload needs to make use of the control interface by sending and processing serialized messages defined in ankaios.proto via writing to and reading from the provided FIFO files output and input found in the mount point /run/ankaios/control_interface/. By using the protobuf compiler (protoc) code in any programming language supported by the protobuf compiler can be generated. The generated code contains functions for serializing and deserializing the messages to and from the Protocol Buffers binary format.

Length-delimited protobuf message layout

The messages are encoded using the length-delimited wire type format and layout inside the FIFO file according to the following visualization:

Length-delimited protobuf message layout inside the file

Every protobuf message is prefixed with its byte length telling the reader how much bytes to read to consume the protobuf message. The byte length has a dynamic length and is encoded as VARINT.

Control interface examples

The subfolder examples inside the Ankaios repository contains example workload applications in various programming languages that are using the control interface. They demonstrate how to easily use the control interface in self-developed workloads. All examples share the same behavior regardless of the programming language and are simplified to focus on the usage of the control interface. Please note that the examples are not are not optimized for production usage.

The following sections showcase in Rust some important parts of the communication with the Ankaios cluster using the control interface. The same concepts are also used in all of the example workload applications.

Sending request message from a workload to Ankaios server

To send out a request message from the workload to the Ankaios server the request message needs to be serialized using the generated serializing function, then encoded as length-delimited protobuf message and then written directly into the output FIFO file. The type of request message is ToAnkaios.

flowchart TD
    begin([Start])
    req_msg(Fill ToAnkaios message)
    ser_msg(Serialize ToAnkaios message using the generated serializing function)
    enc_bytes(Encode as length-delimited varint)
    output("Write encoded bytes to /run/ankaios/control_interface/output")
    fin([end])

    begin --> req_msg
    req_msg --> ser_msg
    ser_msg -->enc_bytes
    enc_bytes --> output
    output --> fin
Send request message via control interface

Code snippet in Rust for sending request message via control interface:

use api::ank_base::{
    request::RequestContent, CompleteState, Dependencies, Request, RestartPolicy, State, Tag, Tags,
    UpdateStateRequest, Workload, WorkloadMap,
};
use api::control_api::{to_ankaios::ToAnkaiosEnum, Hello, ToAnkaios};
use prost::Message;
use std::{collections::HashMap, fs::File, io::Write, path::Path};

const ANKAIOS_CONTROL_INTERFACE_BASE_PATH: &str = "/run/ankaios/control_interface";
const REQUEST_ID: &str = "request_id";

fn create_hello_message() -> ToAnkaios {
    ToAnkaios {
        to_ankaios_enum: Some(ToAnkaiosEnum::Hello(Hello {
            protocol_version: env!("ANKAIOS_VERSION").to_string(),
        })),
    }
}

fn create_request_to_add_new_workload() -> ToAnkaios {
    let new_workloads = Some(WorkloadMap {
        workloads: HashMap::from([(
            "dynamic_nginx".to_string(),
            Workload {
                runtime: Some("podman".to_string()),
                agent: Some("agent_A".to_string()),
                restart_policy: Some(RestartPolicy::Never.into()),
                tags: Some(Tags {
                    tags: vec![Tag {
                        key: "owner".to_string(),
                        value: "Ankaios team".to_string(),
                    }],
                }),
                runtime_config: Some(
                    "image: docker.io/library/nginx\ncommandOptions: [\"-p\", \"8080:80\"]"
                        .to_string(),
                ),
                dependencies: Some(Dependencies {
                    dependencies: HashMap::new(),
                }),
                configs: None,
                control_interface_access: None,
            },
        )]),
    });

    ToAnkaios {
        to_ankaios_enum: Some(ToAnkaiosEnum::Request(Request {
            request_id: REQUEST_ID.to_string(),
            request_content: Some(RequestContent::UpdateStateRequest(Box::new(
                UpdateStateRequest {
                    new_state: Some(CompleteState {
                        desired_state: Some(State {
                            api_version: "v0.1".into(),
                            workloads: new_workloads,
                            ..Default::default()
                        }),
                        ..Default::default()
                    }),
                    update_mask: vec!["desiredState.workloads.dynamic_nginx".to_string()],
                },
            ))),
        })),
    }
}

fn write_to_control_interface() {
    let pipes_location = Path::new(ANKAIOS_CONTROL_INTERFACE_BASE_PATH);
    let sc_req_fifo = pipes_location.join("output");

    let mut sc_req = File::create(&sc_req_fifo).unwrap();

    let protobuf_hello_message = create_hello_message();
    let protobuf_update_workload_request = create_request_to_add_new_workload();

    println!("{}", &format!("Sending UpdateStateRequest containing details for adding the dynamic workload \"dynamic_nginx\": {:#?}", protobuf_update_workload_request));

    sc_req
        .write_all(&protobuf_hello_message.encode_length_delimited_to_vec())
        .unwrap(); // send the initial hello message for establishing the connection

    sc_req
        .write_all(&protobuf_update_workload_request.encode_length_delimited_to_vec())
        .unwrap();
}

fn main() {
    write_to_control_interface();
}

Processing response message from Ankaios server

To process a response message from the Ankaios server the workload needs to read out the bytes from the input FIFO file. As the bytes are encoded as length-delimited protobuf message with a variable length, the length needs to be decoded and extracted first. Then the length can be used to decode and deserialize the read bytes to a response message object for further processing. The type of the response message is FromAnkaios.

flowchart TD
    begin([Start])
    input("Read bytes from /run/ankaios/control_interface/input")
    dec_length(Get length from read length delimited varint encoded bytes)
    deser_msg(Decode and deserialize FromAnkaios message using decoded length and the generated functions)
    further_processing(Process FromAnkaios message object)
    fin([end])

    begin --> input
    input --> dec_length
    dec_length --> deser_msg
    deser_msg --> further_processing
    further_processing --> fin
Read response message via control interface

Code Snippet in Rust for reading response message via control interface:

use api::control_api::{FromAnkaios, from_ankaios::FromAnkaiosEnum};
use prost::Message;
use std::{fs::File, io, io::Read, path::Path};

const REQUEST_ID: &str = "request_id";
const ANKAIOS_CONTROL_INTERFACE_BASE_PATH: &str = "/run/ankaios/control_interface";
const MAX_VARINT_SIZE: usize = 19;

fn read_varint_data(file: &mut File) -> Result<[u8; MAX_VARINT_SIZE], io::Error> {
    let mut res = [0u8; MAX_VARINT_SIZE];
    let mut one_byte_buffer = [0u8; 1];
    for item in res.iter_mut() {
        file.read_exact(&mut one_byte_buffer)?;
        *item = one_byte_buffer[0];
        // check if most significant bit is set to 0 if so it is the last byte to be read
        if *item & 0b10000000 == 0 {
            break;
        }
    }
    Ok(res)
}

fn read_protobuf_data(file: &mut File) -> Result<Box<[u8]>, io::Error> {
    let varint_data = read_varint_data(file)?;
    let mut varint_data = Box::new(&varint_data[..]);

    // determine the exact size for exact reading of the bytes later by decoding the varint data
    let size = prost::encoding::decode_varint(&mut varint_data)? as usize;

    let mut buf = vec![0; size];
    file.read_exact(&mut buf[..])?; // read exact bytes from file
    Ok(buf.into_boxed_slice())
}

fn read_from_control_interface() {
    let pipes_location = Path::new(ANKAIOS_CONTROL_INTERFACE_BASE_PATH);
    let ex_req_fifo = pipes_location.join("input");

    let mut ex_req = File::open(&ex_req_fifo).unwrap();

    loop {
        if let Ok(binary) = read_protobuf_data(&mut ex_req) {
            match FromAnkaios::decode(&mut Box::new(binary.as_ref())) {
                Ok(from_ankaios) => {
                    let Some(FromAnkaiosEnum::Response(response)) = &from_ankaios.from_ankaios_enum
                    else {
                        println!("No response. Continue.");
                        continue;
                    };

                    // use the response if the request id matches
                    let request_id: &String = &response.request_id;
                    if response.request_id == REQUEST_ID {
                        println!(
                            "Received FromAnkaios message containing the response from the server: {:#?}",
                            from_ankaios
                        );
                    } else {
                        println!(
                            "RequestId does not match. Skipping messages from requestId: {}",
                            request_id
                        );
                    }
                }
                Err(err) => {
                    println!("Invalid response, parsing error: '{}'", err);
                }
            }
        }
    }
}

fn main() {
    read_from_control_interface();
}