2018-02-05 16:05:59 -05:00
|
|
|
package daemon // import "github.com/docker/docker/daemon"
|
2015-11-12 14:55:17 -05:00
|
|
|
|
2016-03-09 23:33:21 -05:00
|
|
|
import (
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"net"
|
|
|
|
"os"
|
|
|
|
"path"
|
|
|
|
"strings"
|
2016-07-20 19:11:28 -04:00
|
|
|
"time"
|
2016-03-09 23:33:21 -05:00
|
|
|
|
2016-09-06 14:18:12 -04:00
|
|
|
containertypes "github.com/docker/docker/api/types/container"
|
|
|
|
networktypes "github.com/docker/docker/api/types/network"
|
2016-03-09 23:33:21 -05:00
|
|
|
"github.com/docker/docker/container"
|
|
|
|
"github.com/docker/docker/daemon/network"
|
2018-01-11 14:53:06 -05:00
|
|
|
"github.com/docker/docker/errdefs"
|
2017-02-27 08:21:10 -05:00
|
|
|
"github.com/docker/docker/opts"
|
2016-04-08 18:25:07 -04:00
|
|
|
"github.com/docker/docker/pkg/stringid"
|
2016-03-09 23:33:21 -05:00
|
|
|
"github.com/docker/docker/runconfig"
|
|
|
|
"github.com/docker/go-connections/nat"
|
|
|
|
"github.com/docker/libnetwork"
|
2018-01-09 01:41:48 -05:00
|
|
|
netconst "github.com/docker/libnetwork/datastore"
|
2016-03-09 23:33:21 -05:00
|
|
|
"github.com/docker/libnetwork/netlabel"
|
|
|
|
"github.com/docker/libnetwork/options"
|
|
|
|
"github.com/docker/libnetwork/types"
|
2017-07-26 17:42:13 -04:00
|
|
|
"github.com/sirupsen/logrus"
|
2016-03-09 23:33:21 -05:00
|
|
|
)
|
2015-11-12 14:55:17 -05:00
|
|
|
|
|
|
|
var (
|
|
|
|
// ErrRootFSReadOnly is returned when a container
|
|
|
|
// rootfs is marked readonly.
|
|
|
|
ErrRootFSReadOnly = errors.New("container rootfs is marked read-only")
|
2018-05-10 16:44:09 -04:00
|
|
|
getPortMapInfo = getSandboxPortMapInfo
|
2015-11-12 14:55:17 -05:00
|
|
|
)
|
2016-03-09 23:33:21 -05:00
|
|
|
|
2017-01-13 00:09:57 -05:00
|
|
|
func (daemon *Daemon) getDNSSearchSettings(container *container.Container) []string {
|
|
|
|
if len(container.HostConfig.DNSSearch) > 0 {
|
|
|
|
return container.HostConfig.DNSSearch
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(daemon.configStore.DNSSearch) > 0 {
|
|
|
|
return daemon.configStore.DNSSearch
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2017-02-22 17:02:20 -05:00
|
|
|
|
2016-06-14 12:13:53 -04:00
|
|
|
func (daemon *Daemon) buildSandboxOptions(container *container.Container) ([]libnetwork.SandboxOption, error) {
|
2016-03-09 23:33:21 -05:00
|
|
|
var (
|
|
|
|
sboxOptions []libnetwork.SandboxOption
|
|
|
|
err error
|
|
|
|
dns []string
|
|
|
|
dnsOptions []string
|
|
|
|
bindings = make(nat.PortMap)
|
|
|
|
pbList []types.PortBinding
|
|
|
|
exposeList []types.TransportPort
|
|
|
|
)
|
|
|
|
|
|
|
|
defaultNetName := runconfig.DefaultDaemonNetworkMode().NetworkName()
|
|
|
|
sboxOptions = append(sboxOptions, libnetwork.OptionHostname(container.Config.Hostname),
|
|
|
|
libnetwork.OptionDomainname(container.Config.Domainname))
|
|
|
|
|
|
|
|
if container.HostConfig.NetworkMode.IsHost() {
|
|
|
|
sboxOptions = append(sboxOptions, libnetwork.OptionUseDefaultSandbox())
|
2016-04-06 16:45:43 -04:00
|
|
|
} else {
|
|
|
|
// OptionUseExternalKey is mandatory for userns support.
|
|
|
|
// But optional for non-userns support
|
|
|
|
sboxOptions = append(sboxOptions, libnetwork.OptionUseExternalKey())
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
|
|
|
|
2018-07-17 15:11:38 -04:00
|
|
|
if err = daemon.setupPathsAndSandboxOptions(container, &sboxOptions); err != nil {
|
2016-03-09 23:33:21 -05:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(container.HostConfig.DNS) > 0 {
|
|
|
|
dns = container.HostConfig.DNS
|
|
|
|
} else if len(daemon.configStore.DNS) > 0 {
|
|
|
|
dns = daemon.configStore.DNS
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, d := range dns {
|
|
|
|
sboxOptions = append(sboxOptions, libnetwork.OptionDNS(d))
|
|
|
|
}
|
|
|
|
|
2017-01-13 00:09:57 -05:00
|
|
|
dnsSearch := daemon.getDNSSearchSettings(container)
|
2016-03-09 23:33:21 -05:00
|
|
|
|
|
|
|
for _, ds := range dnsSearch {
|
|
|
|
sboxOptions = append(sboxOptions, libnetwork.OptionDNSSearch(ds))
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(container.HostConfig.DNSOptions) > 0 {
|
|
|
|
dnsOptions = container.HostConfig.DNSOptions
|
|
|
|
} else if len(daemon.configStore.DNSOptions) > 0 {
|
|
|
|
dnsOptions = daemon.configStore.DNSOptions
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, ds := range dnsOptions {
|
|
|
|
sboxOptions = append(sboxOptions, libnetwork.OptionDNSOptions(ds))
|
|
|
|
}
|
|
|
|
|
|
|
|
if container.NetworkSettings.SecondaryIPAddresses != nil {
|
|
|
|
name := container.Config.Hostname
|
|
|
|
if container.Config.Domainname != "" {
|
|
|
|
name = name + "." + container.Config.Domainname
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, a := range container.NetworkSettings.SecondaryIPAddresses {
|
|
|
|
sboxOptions = append(sboxOptions, libnetwork.OptionExtraHost(name, a.Addr))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, extraHost := range container.HostConfig.ExtraHosts {
|
|
|
|
// allow IPv6 addresses in extra hosts; only split on first ":"
|
2017-02-27 08:21:10 -05:00
|
|
|
if _, err := opts.ValidateExtraHost(extraHost); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2016-03-09 23:33:21 -05:00
|
|
|
parts := strings.SplitN(extraHost, ":", 2)
|
2019-11-01 20:09:40 -04:00
|
|
|
// If the IP Address is a string called "host-gateway", replace this
|
|
|
|
// value with the IP address stored in the daemon level HostGatewayIP
|
|
|
|
// config variable
|
|
|
|
if parts[1] == network.HostGatewayName {
|
|
|
|
gateway := daemon.configStore.HostGatewayIP.String()
|
|
|
|
if gateway == "" {
|
|
|
|
return nil, fmt.Errorf("unable to derive the IP value for host-gateway")
|
|
|
|
}
|
|
|
|
parts[1] = gateway
|
|
|
|
}
|
2016-03-09 23:33:21 -05:00
|
|
|
sboxOptions = append(sboxOptions, libnetwork.OptionExtraHost(parts[0], parts[1]))
|
|
|
|
}
|
|
|
|
|
|
|
|
if container.HostConfig.PortBindings != nil {
|
|
|
|
for p, b := range container.HostConfig.PortBindings {
|
|
|
|
bindings[p] = []nat.PortBinding{}
|
|
|
|
for _, bb := range b {
|
|
|
|
bindings[p] = append(bindings[p], nat.PortBinding{
|
|
|
|
HostIP: bb.HostIP,
|
|
|
|
HostPort: bb.HostPort,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
portSpecs := container.Config.ExposedPorts
|
|
|
|
ports := make([]nat.Port, len(portSpecs))
|
|
|
|
var i int
|
|
|
|
for p := range portSpecs {
|
|
|
|
ports[i] = p
|
|
|
|
i++
|
|
|
|
}
|
|
|
|
nat.SortPortMap(ports, bindings)
|
|
|
|
for _, port := range ports {
|
|
|
|
expose := types.TransportPort{}
|
|
|
|
expose.Proto = types.ParseProtocol(port.Proto())
|
|
|
|
expose.Port = uint16(port.Int())
|
|
|
|
exposeList = append(exposeList, expose)
|
|
|
|
|
|
|
|
pb := types.PortBinding{Port: expose.Port, Proto: expose.Proto}
|
|
|
|
binding := bindings[port]
|
|
|
|
for i := 0; i < len(binding); i++ {
|
|
|
|
pbCopy := pb.GetCopy()
|
|
|
|
newP, err := nat.NewPort(nat.SplitProtoPort(binding[i].HostPort))
|
|
|
|
var portStart, portEnd int
|
|
|
|
if err == nil {
|
|
|
|
portStart, portEnd, err = newP.Range()
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error parsing HostPort value(%s):%v", binding[i].HostPort, err)
|
|
|
|
}
|
|
|
|
pbCopy.HostPort = uint16(portStart)
|
|
|
|
pbCopy.HostPortEnd = uint16(portEnd)
|
|
|
|
pbCopy.HostIP = net.ParseIP(binding[i].HostIP)
|
|
|
|
pbList = append(pbList, pbCopy)
|
|
|
|
}
|
|
|
|
|
|
|
|
if container.HostConfig.PublishAllPorts && len(binding) == 0 {
|
|
|
|
pbList = append(pbList, pb)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
sboxOptions = append(sboxOptions,
|
|
|
|
libnetwork.OptionPortMapping(pbList),
|
|
|
|
libnetwork.OptionExposedPorts(exposeList))
|
|
|
|
|
2016-03-11 05:13:37 -05:00
|
|
|
// Legacy Link feature is supported only for the default bridge network.
|
2016-03-09 23:33:21 -05:00
|
|
|
// return if this call to build join options is not for default bridge network
|
2016-06-14 12:13:53 -04:00
|
|
|
// Legacy Link is only supported by docker run --link
|
2016-07-22 18:42:26 -04:00
|
|
|
bridgeSettings, ok := container.NetworkSettings.Networks[defaultNetName]
|
2016-08-23 19:50:15 -04:00
|
|
|
if !ok || bridgeSettings.EndpointSettings == nil {
|
2016-03-09 23:33:21 -05:00
|
|
|
return sboxOptions, nil
|
|
|
|
}
|
|
|
|
|
2016-07-22 18:42:26 -04:00
|
|
|
if bridgeSettings.EndpointID == "" {
|
2016-03-09 23:33:21 -05:00
|
|
|
return sboxOptions, nil
|
|
|
|
}
|
|
|
|
|
2016-06-14 12:13:53 -04:00
|
|
|
var (
|
|
|
|
childEndpoints, parentEndpoints []string
|
|
|
|
cEndpointID string
|
|
|
|
)
|
2016-03-09 23:33:21 -05:00
|
|
|
|
|
|
|
children := daemon.children(container)
|
|
|
|
for linkAlias, child := range children {
|
|
|
|
if !isLinkable(child) {
|
|
|
|
return nil, fmt.Errorf("Cannot link to %s, as it does not belong to the default network", child.Name)
|
|
|
|
}
|
|
|
|
_, alias := path.Split(linkAlias)
|
|
|
|
// allow access to the linked container via the alias, real name, and container hostname
|
|
|
|
aliasList := alias + " " + child.Config.Hostname
|
|
|
|
// only add the name if alias isn't equal to the name
|
|
|
|
if alias != child.Name[1:] {
|
|
|
|
aliasList = aliasList + " " + child.Name[1:]
|
|
|
|
}
|
2019-08-30 17:15:47 -04:00
|
|
|
ipv4 := child.NetworkSettings.Networks[defaultNetName].IPAddress
|
|
|
|
ipv6 := child.NetworkSettings.Networks[defaultNetName].GlobalIPv6Address
|
|
|
|
if ipv4 != "" {
|
|
|
|
sboxOptions = append(sboxOptions, libnetwork.OptionExtraHost(aliasList, ipv4))
|
|
|
|
}
|
|
|
|
if ipv6 != "" {
|
|
|
|
sboxOptions = append(sboxOptions, libnetwork.OptionExtraHost(aliasList, ipv6))
|
|
|
|
}
|
2016-06-14 12:13:53 -04:00
|
|
|
cEndpointID = child.NetworkSettings.Networks[defaultNetName].EndpointID
|
|
|
|
if cEndpointID != "" {
|
|
|
|
childEndpoints = append(childEndpoints, cEndpointID)
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for alias, parent := range daemon.parents(container) {
|
|
|
|
if daemon.configStore.DisableBridge || !container.HostConfig.NetworkMode.IsPrivate() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
_, alias = path.Split(alias)
|
|
|
|
logrus.Debugf("Update /etc/hosts of %s for alias %s with ip %s", parent.ID, alias, bridgeSettings.IPAddress)
|
|
|
|
sboxOptions = append(sboxOptions, libnetwork.OptionParentUpdate(
|
|
|
|
parent.ID,
|
|
|
|
alias,
|
|
|
|
bridgeSettings.IPAddress,
|
|
|
|
))
|
2016-06-14 12:13:53 -04:00
|
|
|
if cEndpointID != "" {
|
|
|
|
parentEndpoints = append(parentEndpoints, cEndpointID)
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
linkOptions := options.Generic{
|
|
|
|
netlabel.GenericData: options.Generic{
|
|
|
|
"ParentEndpoints": parentEndpoints,
|
|
|
|
"ChildEndpoints": childEndpoints,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
sboxOptions = append(sboxOptions, libnetwork.OptionGeneric(linkOptions))
|
|
|
|
return sboxOptions, nil
|
|
|
|
}
|
|
|
|
|
2016-08-23 19:50:15 -04:00
|
|
|
func (daemon *Daemon) updateNetworkSettings(container *container.Container, n libnetwork.Network, endpointConfig *networktypes.EndpointSettings) error {
|
2016-03-09 23:33:21 -05:00
|
|
|
if container.NetworkSettings == nil {
|
Prevent panic on network attach
In situations where `container.NetworkSettings` was not nil, but
`container.NetworkSettings.Networks` was, a panic could occur:
```
2019-06-10 15:26:50.548309 I | http: panic serving @: assignment to entry in nil map
goroutine 1376 [running]:
net/http.(*conn).serve.func1(0xc4211068c0)
/usr/local/go/src/net/http/server.go:1726 +0xd2
panic(0x558939d7e1e0, 0x55893a0c4410)
/usr/local/go/src/runtime/panic.go:502 +0x22d
github.com/docker/docker/daemon.(*Daemon).updateNetworkSettings(0xc42090c5a0, 0xc420fb6fc0, 0x55893a101140, 0xc4210e0540, 0xc42112aa80, 0xc4217d77a0, 0x0)
/go/src/github.com/docker/docker/daemon/container_operations.go:275 +0x40e
github.com/docker/docker/daemon.(*Daemon).updateNetworkConfig(0xc42090c5a0, 0xc420fb6fc0, 0x55893a101140, 0xc4210e0540, 0xc42112aa80, 0x55893a101101, 0xc4210e0540, 0x0)
/go/src/github.com/docker/docker/daemon/container_operations.go:683 +0x219
github.com/docker/docker/daemon.(*Daemon).connectToNetwork(0xc42090c5a0, 0xc420fb6fc0, 0xc420e8290f, 0x40, 0xc42112aa80, 0x558937eabd01, 0x0, 0x0)
/go/src/github.com/docker/docker/daemon/container_operations.go:728 +0x1cb
github.com/docker/docker/daemon.(*Daemon).ConnectToNetwork(0xc42090c5a0, 0xc420fb6fc0, 0xc420e8290f, 0x40, 0xc42112aa80, 0x0, 0x0)
/go/src/github.com/docker/docker/daemon/container_operations.go:1046 +0x2b3
github.com/docker/docker/daemon.(*Daemon).ConnectContainerToNetwork(0xc42090c5a0, 0xc4214ca580, 0x40, 0xc420e8290f, 0x40, 0xc42112aa80, 0x2, 0xe600000000000001)
/go/src/github.com/docker/docker/daemon/network.go:450 +0xa1
github.com/docker/docker/api/server/router/network.(*networkRouter).postNetworkConnect(0xc42121bbc0, 0x55893a0edee0, 0xc420de7cb0, 0x55893a0ec2e0, 0xc4207f0e00, 0xc420173600, 0xc420de7980, 0x5589394707cc, 0x5)
/go/src/github.com/docker/docker/api/server/router/network/network_routes.go:278 +0x330
github.com/docker/docker/api/server/router/network.(*networkRouter).(github.com/docker/docker/api/server/router/network.postNetworkConnect)-fm(0x55893a0edee0, 0xc420de7cb0, 0x55893a0ec2e0, 0xc4207f0e00, 0xc420173600, 0xc420de7980, 0x558937fd89dc, 0x558939f2cec0)
/go/src/github.com/docker/docker/api/server/router/network/network.go:37 +0x6b
github.com/docker/docker/api/server/middleware.ExperimentalMiddleware.WrapHandler.func1(0x55893a0edee0, 0xc420de7cb0, 0x55893a0ec2e0, 0xc4207f0e00, 0xc420173600, 0xc420de7980, 0x55893a0edee0, 0xc420de7cb0)
/go/src/github.com/docker/docker/api/server/middleware/experimental.go:26 +0xda
github.com/docker/docker/api/server/middleware.VersionMiddleware.WrapHandler.func1(0x55893a0edee0, 0xc420de7a70, 0x55893a0ec2e0, 0xc4207f0e00, 0xc420173600, 0xc420de7980, 0x0, 0x0)
/go/src/github.com/docker/docker/api/server/middleware/version.go:62 +0x401
github.com/docker/docker/pkg/authorization.(*Middleware).WrapHandler.func1(0x55893a0edee0, 0xc420de7a70, 0x55893a0ec2e0, 0xc4207f0e00, 0xc420173600, 0xc420de7980, 0x0, 0x558939640868)
/go/src/github.com/docker/docker/pkg/authorization/middleware.go:59 +0x7ab
github.com/docker/docker/api/server/middleware.DebugRequestMiddleware.func1(0x55893a0edee0, 0xc420de7a70, 0x55893a0ec2e0, 0xc4207f0e00, 0xc420173600, 0xc420de7980, 0x55893a0edee0, 0xc420de7a70)
/go/src/github.com/docker/docker/api/server/middleware/debug.go:53 +0x4b8
github.com/docker/docker/api/server.(*Server).makeHTTPHandler.func1(0x55893a0ec2e0, 0xc4207f0e00, 0xc420173600)
/go/src/github.com/docker/docker/api/server/server.go:141 +0x19a
net/http.HandlerFunc.ServeHTTP(0xc420e0c0e0, 0x55893a0ec2e0, 0xc4207f0e00, 0xc420173600)
/usr/local/go/src/net/http/server.go:1947 +0x46
github.com/docker/docker/vendor/github.com/gorilla/mux.(*Router).ServeHTTP(0xc420ce5950, 0x55893a0ec2e0, 0xc4207f0e00, 0xc420173600)
/go/src/github.com/docker/docker/vendor/github.com/gorilla/mux/mux.go:103 +0x228
github.com/docker/docker/api/server.(*routerSwapper).ServeHTTP(0xc421078330, 0x55893a0ec2e0, 0xc4207f0e00, 0xc420173600)
/go/src/github.com/docker/docker/api/server/router_swapper.go:29 +0x72
net/http.serverHandler.ServeHTTP(0xc420902f70, 0x55893a0ec2e0, 0xc4207f0e00, 0xc420173600)
/usr/local/go/src/net/http/server.go:2697 +0xbe
net/http.(*conn).serve(0xc4211068c0, 0x55893a0ede20, 0xc420d81440)
/usr/local/go/src/net/http/server.go:1830 +0x653
created by net/http.(*Server).Serve
/usr/local/go/src/net/http/server.go:2798 +0x27d
```
I have not been able to reproduce the situation, but preventing a panic should
not hurt.
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2019-07-22 08:44:04 -04:00
|
|
|
container.NetworkSettings = &network.Settings{}
|
|
|
|
}
|
|
|
|
if container.NetworkSettings.Networks == nil {
|
|
|
|
container.NetworkSettings.Networks = make(map[string]*network.EndpointSettings)
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
if !container.HostConfig.NetworkMode.IsHost() && containertypes.NetworkMode(n.Type()).IsHost() {
|
|
|
|
return runconfig.ErrConflictHostNetwork
|
|
|
|
}
|
|
|
|
|
2017-10-31 15:46:53 -04:00
|
|
|
for s, v := range container.NetworkSettings.Networks {
|
2018-01-15 12:26:43 -05:00
|
|
|
sn, err := daemon.FindNetwork(getNetworkID(s, v.EndpointSettings))
|
2016-03-09 23:33:21 -05:00
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if sn.Name() == n.Name() {
|
2018-01-09 01:41:48 -05:00
|
|
|
// If the network scope is swarm, then this
|
|
|
|
// is an attachable network, which may not
|
|
|
|
// be locally available previously.
|
|
|
|
// So always update.
|
|
|
|
if n.Info().Scope() == netconst.SwarmScope {
|
|
|
|
continue
|
|
|
|
}
|
2016-03-09 23:33:21 -05:00
|
|
|
// Avoid duplicate config
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
if !containertypes.NetworkMode(sn.Type()).IsPrivate() ||
|
|
|
|
!containertypes.NetworkMode(n.Type()).IsPrivate() {
|
|
|
|
return runconfig.ErrConflictSharedNetwork
|
|
|
|
}
|
|
|
|
if containertypes.NetworkMode(sn.Name()).IsNone() ||
|
|
|
|
containertypes.NetworkMode(n.Name()).IsNone() {
|
|
|
|
return runconfig.ErrConflictNoNetwork
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-09 01:41:48 -05:00
|
|
|
container.NetworkSettings.Networks[n.Name()] = &network.EndpointSettings{
|
|
|
|
EndpointSettings: endpointConfig,
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (daemon *Daemon) updateEndpointNetworkSettings(container *container.Container, n libnetwork.Network, ep libnetwork.Endpoint) error {
|
2018-05-10 16:44:09 -04:00
|
|
|
if err := buildEndpointInfo(container.NetworkSettings, n, ep); err != nil {
|
2016-03-09 23:33:21 -05:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if container.HostConfig.NetworkMode == runconfig.DefaultDaemonNetworkMode() {
|
2017-01-23 06:23:07 -05:00
|
|
|
container.NetworkSettings.Bridge = daemon.configStore.BridgeConfig.Iface
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// UpdateNetwork is used to update the container's network (e.g. when linked containers
|
|
|
|
// get removed/unlinked).
|
|
|
|
func (daemon *Daemon) updateNetwork(container *container.Container) error {
|
2016-07-20 19:11:28 -04:00
|
|
|
var (
|
|
|
|
start = time.Now()
|
|
|
|
ctrl = daemon.netController
|
|
|
|
sid = container.NetworkSettings.SandboxID
|
|
|
|
)
|
2016-03-09 23:33:21 -05:00
|
|
|
|
|
|
|
sb, err := ctrl.SandboxByID(sid)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error locating sandbox id %s: %v", sid, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Find if container is connected to the default bridge network
|
|
|
|
var n libnetwork.Network
|
2017-10-31 15:46:53 -04:00
|
|
|
for name, v := range container.NetworkSettings.Networks {
|
2018-01-15 12:26:43 -05:00
|
|
|
sn, err := daemon.FindNetwork(getNetworkID(name, v.EndpointSettings))
|
2016-03-09 23:33:21 -05:00
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if sn.Name() == runconfig.DefaultDaemonNetworkMode().NetworkName() {
|
|
|
|
n = sn
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if n == nil {
|
|
|
|
// Not connected to the default bridge network; Nothing to do
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-08-09 08:10:07 -04:00
|
|
|
sbOptions, err := daemon.buildSandboxOptions(container)
|
2016-03-09 23:33:21 -05:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Update network failed: %v", err)
|
|
|
|
}
|
|
|
|
|
2019-08-09 08:10:07 -04:00
|
|
|
if err := sb.Refresh(sbOptions...); err != nil {
|
2016-03-09 23:33:21 -05:00
|
|
|
return fmt.Errorf("Update network failed: Failure in refresh sandbox %s: %v", sid, err)
|
|
|
|
}
|
|
|
|
|
2016-07-20 19:11:28 -04:00
|
|
|
networkActions.WithValues("update").UpdateSince(start)
|
|
|
|
|
2016-03-09 23:33:21 -05:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-08-23 19:50:15 -04:00
|
|
|
func (daemon *Daemon) findAndAttachNetwork(container *container.Container, idOrName string, epConfig *networktypes.EndpointSettings) (libnetwork.Network, *networktypes.NetworkingConfig, error) {
|
Fix race in attachable network attachment
Attachable networks are networks created on the cluster which can then
be attached to by non-swarm containers. These networks are lazily
created on the node that wants to attach to that network.
When no container is currently attached to one of these networks on a
node, and then multiple containers which want that network are started
concurrently, this can cause a race condition in the network attachment
where essentially we try to attach the same network to the node twice.
To easily reproduce this issue you must use a multi-node cluster with a
worker node that has lots of CPUs (I used a 36 CPU node).
Repro steps:
1. On manager, `docker network create -d overlay --attachable test`
2. On worker, `docker create --restart=always --network test busybox
top`, many times... 200 is a good number (but not much more due to
subnet size restrictions)
3. Restart the daemon
When the daemon restarts, it will attempt to start all those containers
simultaneously. Note that you could try to do this yourself over the API,
but it's harder to trigger due to the added latency from going over
the API.
The error produced happens when the daemon tries to start the container
upon allocating the network resources:
```
attaching to network failed, make sure your network options are correct and check manager logs: context deadline exceeded
```
What happens here is the worker makes a network attachment request to
the manager. This is an async call which in the happy case would cause a
task to be placed on the node, which the worker is waiting for to get
the network configuration.
In the case of this race, the error ocurrs on the manager like this:
```
task allocation failure" error="failed during network allocation for task n7bwwwbymj2o2h9asqkza8gom: failed to allocate network IP for task n7bwwwbymj2o2h9asqkza8gom network rj4szie2zfauqnpgh4eri1yue: could not find an available IP" module=node node.id=u3489c490fx1df8onlyfo1v6e
```
The task is not created and the worker times out waiting for the task.
---
The mitigation for this is to make sure that only one attachment reuest
is in flight for a given network at a time *when the network doesn't
already exist on the node*. If the network already exists on the node
there is no need for synchronization because the network is already
allocated and on the node so there is no need to request it from the
manager.
This basically comes down to a race with `Find(network) ||
Create(network)` without any sort of syncronization.
Signed-off-by: Brian Goff <cpuguy83@gmail.com>
2018-02-02 12:54:08 -05:00
|
|
|
id := getNetworkID(idOrName, epConfig)
|
|
|
|
|
|
|
|
n, err := daemon.FindNetwork(id)
|
2016-08-23 19:50:15 -04:00
|
|
|
if err != nil {
|
|
|
|
// We should always be able to find the network for a
|
|
|
|
// managed container.
|
|
|
|
if container.Managed {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we found a network and if it is not dynamically created
|
|
|
|
// we should never attempt to attach to that network here.
|
|
|
|
if n != nil {
|
|
|
|
if container.Managed || !n.Info().Dynamic() {
|
|
|
|
return n, nil, nil
|
|
|
|
}
|
2019-04-24 14:24:39 -04:00
|
|
|
// Throw an error if the container is already attached to the network
|
|
|
|
if container.NetworkSettings.Networks != nil {
|
|
|
|
networkName := n.Name()
|
|
|
|
containerName := strings.TrimPrefix(container.Name, "/")
|
2019-08-09 08:10:07 -04:00
|
|
|
if nw, ok := container.NetworkSettings.Networks[networkName]; ok && nw.EndpointID != "" {
|
2019-05-03 01:00:34 -04:00
|
|
|
err := fmt.Errorf("%s is already attached to network %s", containerName, networkName)
|
|
|
|
return n, nil, errdefs.Conflict(err)
|
2019-04-24 14:24:39 -04:00
|
|
|
}
|
|
|
|
}
|
2016-08-23 19:50:15 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
var addresses []string
|
|
|
|
if epConfig != nil && epConfig.IPAMConfig != nil {
|
|
|
|
if epConfig.IPAMConfig.IPv4Address != "" {
|
|
|
|
addresses = append(addresses, epConfig.IPAMConfig.IPv4Address)
|
|
|
|
}
|
|
|
|
|
|
|
|
if epConfig.IPAMConfig.IPv6Address != "" {
|
|
|
|
addresses = append(addresses, epConfig.IPAMConfig.IPv6Address)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-17 17:33:56 -04:00
|
|
|
var (
|
|
|
|
config *networktypes.NetworkingConfig
|
|
|
|
retryCount int
|
|
|
|
)
|
2016-08-23 19:50:15 -04:00
|
|
|
|
Fix race in attachable network attachment
Attachable networks are networks created on the cluster which can then
be attached to by non-swarm containers. These networks are lazily
created on the node that wants to attach to that network.
When no container is currently attached to one of these networks on a
node, and then multiple containers which want that network are started
concurrently, this can cause a race condition in the network attachment
where essentially we try to attach the same network to the node twice.
To easily reproduce this issue you must use a multi-node cluster with a
worker node that has lots of CPUs (I used a 36 CPU node).
Repro steps:
1. On manager, `docker network create -d overlay --attachable test`
2. On worker, `docker create --restart=always --network test busybox
top`, many times... 200 is a good number (but not much more due to
subnet size restrictions)
3. Restart the daemon
When the daemon restarts, it will attempt to start all those containers
simultaneously. Note that you could try to do this yourself over the API,
but it's harder to trigger due to the added latency from going over
the API.
The error produced happens when the daemon tries to start the container
upon allocating the network resources:
```
attaching to network failed, make sure your network options are correct and check manager logs: context deadline exceeded
```
What happens here is the worker makes a network attachment request to
the manager. This is an async call which in the happy case would cause a
task to be placed on the node, which the worker is waiting for to get
the network configuration.
In the case of this race, the error ocurrs on the manager like this:
```
task allocation failure" error="failed during network allocation for task n7bwwwbymj2o2h9asqkza8gom: failed to allocate network IP for task n7bwwwbymj2o2h9asqkza8gom network rj4szie2zfauqnpgh4eri1yue: could not find an available IP" module=node node.id=u3489c490fx1df8onlyfo1v6e
```
The task is not created and the worker times out waiting for the task.
---
The mitigation for this is to make sure that only one attachment reuest
is in flight for a given network at a time *when the network doesn't
already exist on the node*. If the network already exists on the node
there is no need for synchronization because the network is already
allocated and on the node so there is no need to request it from the
manager.
This basically comes down to a race with `Find(network) ||
Create(network)` without any sort of syncronization.
Signed-off-by: Brian Goff <cpuguy83@gmail.com>
2018-02-02 12:54:08 -05:00
|
|
|
if n == nil && daemon.attachableNetworkLock != nil {
|
|
|
|
daemon.attachableNetworkLock.Lock(id)
|
|
|
|
defer daemon.attachableNetworkLock.Unlock(id)
|
|
|
|
}
|
|
|
|
|
2016-10-17 17:33:56 -04:00
|
|
|
for {
|
|
|
|
// In all other cases, attempt to attach to the network to
|
|
|
|
// trigger attachment in the swarm cluster manager.
|
2016-08-23 19:50:15 -04:00
|
|
|
if daemon.clusterProvider != nil {
|
2016-10-17 17:33:56 -04:00
|
|
|
var err error
|
Fix race in attachable network attachment
Attachable networks are networks created on the cluster which can then
be attached to by non-swarm containers. These networks are lazily
created on the node that wants to attach to that network.
When no container is currently attached to one of these networks on a
node, and then multiple containers which want that network are started
concurrently, this can cause a race condition in the network attachment
where essentially we try to attach the same network to the node twice.
To easily reproduce this issue you must use a multi-node cluster with a
worker node that has lots of CPUs (I used a 36 CPU node).
Repro steps:
1. On manager, `docker network create -d overlay --attachable test`
2. On worker, `docker create --restart=always --network test busybox
top`, many times... 200 is a good number (but not much more due to
subnet size restrictions)
3. Restart the daemon
When the daemon restarts, it will attempt to start all those containers
simultaneously. Note that you could try to do this yourself over the API,
but it's harder to trigger due to the added latency from going over
the API.
The error produced happens when the daemon tries to start the container
upon allocating the network resources:
```
attaching to network failed, make sure your network options are correct and check manager logs: context deadline exceeded
```
What happens here is the worker makes a network attachment request to
the manager. This is an async call which in the happy case would cause a
task to be placed on the node, which the worker is waiting for to get
the network configuration.
In the case of this race, the error ocurrs on the manager like this:
```
task allocation failure" error="failed during network allocation for task n7bwwwbymj2o2h9asqkza8gom: failed to allocate network IP for task n7bwwwbymj2o2h9asqkza8gom network rj4szie2zfauqnpgh4eri1yue: could not find an available IP" module=node node.id=u3489c490fx1df8onlyfo1v6e
```
The task is not created and the worker times out waiting for the task.
---
The mitigation for this is to make sure that only one attachment reuest
is in flight for a given network at a time *when the network doesn't
already exist on the node*. If the network already exists on the node
there is no need for synchronization because the network is already
allocated and on the node so there is no need to request it from the
manager.
This basically comes down to a race with `Find(network) ||
Create(network)` without any sort of syncronization.
Signed-off-by: Brian Goff <cpuguy83@gmail.com>
2018-02-02 12:54:08 -05:00
|
|
|
config, err = daemon.clusterProvider.AttachNetwork(id, container.ID, addresses)
|
2016-10-17 17:33:56 -04:00
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
2016-08-23 19:50:15 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
Fix race in attachable network attachment
Attachable networks are networks created on the cluster which can then
be attached to by non-swarm containers. These networks are lazily
created on the node that wants to attach to that network.
When no container is currently attached to one of these networks on a
node, and then multiple containers which want that network are started
concurrently, this can cause a race condition in the network attachment
where essentially we try to attach the same network to the node twice.
To easily reproduce this issue you must use a multi-node cluster with a
worker node that has lots of CPUs (I used a 36 CPU node).
Repro steps:
1. On manager, `docker network create -d overlay --attachable test`
2. On worker, `docker create --restart=always --network test busybox
top`, many times... 200 is a good number (but not much more due to
subnet size restrictions)
3. Restart the daemon
When the daemon restarts, it will attempt to start all those containers
simultaneously. Note that you could try to do this yourself over the API,
but it's harder to trigger due to the added latency from going over
the API.
The error produced happens when the daemon tries to start the container
upon allocating the network resources:
```
attaching to network failed, make sure your network options are correct and check manager logs: context deadline exceeded
```
What happens here is the worker makes a network attachment request to
the manager. This is an async call which in the happy case would cause a
task to be placed on the node, which the worker is waiting for to get
the network configuration.
In the case of this race, the error ocurrs on the manager like this:
```
task allocation failure" error="failed during network allocation for task n7bwwwbymj2o2h9asqkza8gom: failed to allocate network IP for task n7bwwwbymj2o2h9asqkza8gom network rj4szie2zfauqnpgh4eri1yue: could not find an available IP" module=node node.id=u3489c490fx1df8onlyfo1v6e
```
The task is not created and the worker times out waiting for the task.
---
The mitigation for this is to make sure that only one attachment reuest
is in flight for a given network at a time *when the network doesn't
already exist on the node*. If the network already exists on the node
there is no need for synchronization because the network is already
allocated and on the node so there is no need to request it from the
manager.
This basically comes down to a race with `Find(network) ||
Create(network)` without any sort of syncronization.
Signed-off-by: Brian Goff <cpuguy83@gmail.com>
2018-02-02 12:54:08 -05:00
|
|
|
n, err = daemon.FindNetwork(id)
|
2016-10-17 17:33:56 -04:00
|
|
|
if err != nil {
|
|
|
|
if daemon.clusterProvider != nil {
|
Fix race in attachable network attachment
Attachable networks are networks created on the cluster which can then
be attached to by non-swarm containers. These networks are lazily
created on the node that wants to attach to that network.
When no container is currently attached to one of these networks on a
node, and then multiple containers which want that network are started
concurrently, this can cause a race condition in the network attachment
where essentially we try to attach the same network to the node twice.
To easily reproduce this issue you must use a multi-node cluster with a
worker node that has lots of CPUs (I used a 36 CPU node).
Repro steps:
1. On manager, `docker network create -d overlay --attachable test`
2. On worker, `docker create --restart=always --network test busybox
top`, many times... 200 is a good number (but not much more due to
subnet size restrictions)
3. Restart the daemon
When the daemon restarts, it will attempt to start all those containers
simultaneously. Note that you could try to do this yourself over the API,
but it's harder to trigger due to the added latency from going over
the API.
The error produced happens when the daemon tries to start the container
upon allocating the network resources:
```
attaching to network failed, make sure your network options are correct and check manager logs: context deadline exceeded
```
What happens here is the worker makes a network attachment request to
the manager. This is an async call which in the happy case would cause a
task to be placed on the node, which the worker is waiting for to get
the network configuration.
In the case of this race, the error ocurrs on the manager like this:
```
task allocation failure" error="failed during network allocation for task n7bwwwbymj2o2h9asqkza8gom: failed to allocate network IP for task n7bwwwbymj2o2h9asqkza8gom network rj4szie2zfauqnpgh4eri1yue: could not find an available IP" module=node node.id=u3489c490fx1df8onlyfo1v6e
```
The task is not created and the worker times out waiting for the task.
---
The mitigation for this is to make sure that only one attachment reuest
is in flight for a given network at a time *when the network doesn't
already exist on the node*. If the network already exists on the node
there is no need for synchronization because the network is already
allocated and on the node so there is no need to request it from the
manager.
This basically comes down to a race with `Find(network) ||
Create(network)` without any sort of syncronization.
Signed-off-by: Brian Goff <cpuguy83@gmail.com>
2018-02-02 12:54:08 -05:00
|
|
|
if err := daemon.clusterProvider.DetachNetwork(id, container.ID); err != nil {
|
2016-10-17 17:33:56 -04:00
|
|
|
logrus.Warnf("Could not rollback attachment for container %s to network %s: %v", container.ID, idOrName, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Retry network attach again if we failed to
|
2017-01-19 02:29:28 -05:00
|
|
|
// find the network after successful
|
2016-10-17 17:33:56 -04:00
|
|
|
// attachment because the only reason that
|
|
|
|
// would happen is if some other container
|
|
|
|
// attached to the swarm scope network went down
|
|
|
|
// and removed the network while we were in
|
|
|
|
// the process of attaching.
|
|
|
|
if config != nil {
|
|
|
|
if _, ok := err.(libnetwork.ErrNoSuchNetwork); ok {
|
|
|
|
if retryCount >= 5 {
|
|
|
|
return nil, nil, fmt.Errorf("could not find network %s after successful attachment", idOrName)
|
|
|
|
}
|
|
|
|
retryCount++
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
break
|
2016-08-23 19:50:15 -04:00
|
|
|
}
|
|
|
|
|
2016-09-09 12:55:57 -04:00
|
|
|
// This container has attachment to a swarm scope
|
|
|
|
// network. Update the container network settings accordingly.
|
|
|
|
container.NetworkSettings.HasSwarmEndpoint = true
|
2016-08-23 19:50:15 -04:00
|
|
|
return n, config, nil
|
|
|
|
}
|
|
|
|
|
2016-12-28 11:29:15 -05:00
|
|
|
// updateContainerNetworkSettings updates the network settings
|
2016-09-23 01:06:30 -04:00
|
|
|
func (daemon *Daemon) updateContainerNetworkSettings(container *container.Container, endpointsConfig map[string]*networktypes.EndpointSettings) {
|
2016-08-23 19:50:15 -04:00
|
|
|
var n libnetwork.Network
|
2016-03-09 23:33:21 -05:00
|
|
|
|
|
|
|
mode := container.HostConfig.NetworkMode
|
|
|
|
if container.Config.NetworkDisabled || mode.IsContainer() {
|
2016-09-23 01:06:30 -04:00
|
|
|
return
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
networkName := mode.NetworkName()
|
|
|
|
if mode.IsDefault() {
|
|
|
|
networkName = daemon.netController.Config().Daemon.DefaultNetwork
|
|
|
|
}
|
2016-08-23 19:50:15 -04:00
|
|
|
|
2016-03-09 23:33:21 -05:00
|
|
|
if mode.IsUserDefined() {
|
2016-08-23 19:50:15 -04:00
|
|
|
var err error
|
|
|
|
|
2018-01-15 12:26:43 -05:00
|
|
|
n, err = daemon.FindNetwork(networkName)
|
2016-08-23 19:50:15 -04:00
|
|
|
if err == nil {
|
|
|
|
networkName = n.Name()
|
2016-06-13 22:52:49 -04:00
|
|
|
}
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
2016-08-23 19:50:15 -04:00
|
|
|
|
2016-03-09 23:33:21 -05:00
|
|
|
if container.NetworkSettings == nil {
|
|
|
|
container.NetworkSettings = &network.Settings{}
|
|
|
|
}
|
2016-08-23 19:50:15 -04:00
|
|
|
|
2016-03-09 23:33:21 -05:00
|
|
|
if len(endpointsConfig) > 0 {
|
2016-08-23 19:50:15 -04:00
|
|
|
if container.NetworkSettings.Networks == nil {
|
|
|
|
container.NetworkSettings.Networks = make(map[string]*network.EndpointSettings)
|
|
|
|
}
|
|
|
|
|
|
|
|
for name, epConfig := range endpointsConfig {
|
|
|
|
container.NetworkSettings.Networks[name] = &network.EndpointSettings{
|
|
|
|
EndpointSettings: epConfig,
|
|
|
|
}
|
|
|
|
}
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
2016-08-23 19:50:15 -04:00
|
|
|
|
2016-03-09 23:33:21 -05:00
|
|
|
if container.NetworkSettings.Networks == nil {
|
2016-08-23 19:50:15 -04:00
|
|
|
container.NetworkSettings.Networks = make(map[string]*network.EndpointSettings)
|
|
|
|
container.NetworkSettings.Networks[networkName] = &network.EndpointSettings{
|
|
|
|
EndpointSettings: &networktypes.EndpointSettings{},
|
|
|
|
}
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
2016-08-23 19:50:15 -04:00
|
|
|
|
|
|
|
// Convert any settings added by client in default name to
|
|
|
|
// engine's default network name key
|
|
|
|
if mode.IsDefault() {
|
|
|
|
if nConf, ok := container.NetworkSettings.Networks[mode.NetworkName()]; ok {
|
|
|
|
container.NetworkSettings.Networks[networkName] = nConf
|
|
|
|
delete(container.NetworkSettings.Networks, mode.NetworkName())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-03-09 23:33:21 -05:00
|
|
|
if !mode.IsUserDefined() {
|
2016-09-23 01:06:30 -04:00
|
|
|
return
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
|
|
|
// Make sure to internally store the per network endpoint config by network name
|
|
|
|
if _, ok := container.NetworkSettings.Networks[networkName]; ok {
|
2016-09-23 01:06:30 -04:00
|
|
|
return
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
2016-08-23 19:50:15 -04:00
|
|
|
|
|
|
|
if n != nil {
|
|
|
|
if nwConfig, ok := container.NetworkSettings.Networks[n.ID()]; ok {
|
|
|
|
container.NetworkSettings.Networks[networkName] = nwConfig
|
|
|
|
delete(container.NetworkSettings.Networks, n.ID())
|
2016-09-23 01:06:30 -04:00
|
|
|
return
|
2016-08-23 19:50:15 -04:00
|
|
|
}
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (daemon *Daemon) allocateNetwork(container *container.Container) error {
|
2016-07-20 19:11:28 -04:00
|
|
|
start := time.Now()
|
2016-03-09 23:33:21 -05:00
|
|
|
controller := daemon.netController
|
|
|
|
|
|
|
|
if daemon.netController == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Cleanup any stale sandbox left over due to ungraceful daemon shutdown
|
|
|
|
if err := controller.SandboxDestroy(container.ID); err != nil {
|
|
|
|
logrus.Errorf("failed to cleanup up stale network sandbox for container %s", container.ID)
|
|
|
|
}
|
|
|
|
|
2017-02-28 23:03:43 -05:00
|
|
|
if container.Config.NetworkDisabled || container.HostConfig.NetworkMode.IsContainer() {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-03-09 23:33:21 -05:00
|
|
|
updateSettings := false
|
|
|
|
|
2017-02-28 23:03:43 -05:00
|
|
|
if len(container.NetworkSettings.Networks) == 0 {
|
2016-09-23 01:06:30 -04:00
|
|
|
daemon.updateContainerNetworkSettings(container, nil)
|
2016-03-09 23:33:21 -05:00
|
|
|
updateSettings = true
|
|
|
|
}
|
|
|
|
|
2016-05-26 03:20:53 -04:00
|
|
|
// always connect default network first since only default
|
|
|
|
// network mode support link and we need do some setting
|
2016-06-24 15:04:26 -04:00
|
|
|
// on sandbox initialize for link, but the sandbox only be initialized
|
2016-05-26 03:20:53 -04:00
|
|
|
// on first network connecting.
|
|
|
|
defaultNetName := runconfig.DefaultDaemonNetworkMode().NetworkName()
|
|
|
|
if nConf, ok := container.NetworkSettings.Networks[defaultNetName]; ok {
|
2016-09-09 12:55:57 -04:00
|
|
|
cleanOperationalData(nConf)
|
2016-08-23 19:50:15 -04:00
|
|
|
if err := daemon.connectToNetwork(container, defaultNetName, nConf.EndpointSettings, updateSettings); err != nil {
|
2016-05-26 03:20:53 -04:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
2016-08-23 19:50:15 -04:00
|
|
|
|
2016-09-21 23:18:07 -04:00
|
|
|
// the intermediate map is necessary because "connectToNetwork" modifies "container.NetworkSettings.Networks"
|
|
|
|
networks := make(map[string]*network.EndpointSettings)
|
2016-08-23 19:50:15 -04:00
|
|
|
for n, epConf := range container.NetworkSettings.Networks {
|
2016-05-26 03:20:53 -04:00
|
|
|
if n == defaultNetName {
|
|
|
|
continue
|
|
|
|
}
|
2016-08-23 19:50:15 -04:00
|
|
|
|
2016-09-21 23:18:07 -04:00
|
|
|
networks[n] = epConf
|
2016-08-23 19:50:15 -04:00
|
|
|
}
|
|
|
|
|
2016-09-21 23:18:07 -04:00
|
|
|
for netName, epConf := range networks {
|
2016-09-09 12:55:57 -04:00
|
|
|
cleanOperationalData(epConf)
|
2016-09-21 23:18:07 -04:00
|
|
|
if err := daemon.connectToNetwork(container, netName, epConf.EndpointSettings, updateSettings); err != nil {
|
2016-03-09 23:33:21 -05:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-03-22 05:38:26 -04:00
|
|
|
// If the container is not to be connected to any network,
|
|
|
|
// create its network sandbox now if not present
|
|
|
|
if len(networks) == 0 {
|
|
|
|
if nil == daemon.getNetworkSandbox(container) {
|
2019-08-09 08:10:07 -04:00
|
|
|
sbOptions, err := daemon.buildSandboxOptions(container)
|
2017-03-22 05:38:26 -04:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-08-09 08:10:07 -04:00
|
|
|
sb, err := daemon.netController.NewSandbox(container.ID, sbOptions...)
|
2017-03-22 05:38:26 -04:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2018-05-10 16:44:09 -04:00
|
|
|
updateSandboxNetworkSettings(container, sb)
|
2017-03-22 05:38:26 -04:00
|
|
|
defer func() {
|
|
|
|
if err != nil {
|
|
|
|
sb.Delete()
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2017-04-06 13:43:10 -04:00
|
|
|
if _, err := container.WriteHostConfig(); err != nil {
|
2016-07-20 19:11:28 -04:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
networkActions.WithValues("allocate").UpdateSince(start)
|
|
|
|
return nil
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
func (daemon *Daemon) getNetworkSandbox(container *container.Container) libnetwork.Sandbox {
|
|
|
|
var sb libnetwork.Sandbox
|
|
|
|
daemon.netController.WalkSandboxes(func(s libnetwork.Sandbox) bool {
|
|
|
|
if s.ContainerID() == container.ID {
|
|
|
|
sb = s
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
})
|
|
|
|
return sb
|
|
|
|
}
|
|
|
|
|
2019-03-20 05:15:10 -04:00
|
|
|
// hasUserDefinedIPAddress returns whether the passed IPAM configuration contains IP address configuration
|
|
|
|
func hasUserDefinedIPAddress(ipamConfig *networktypes.EndpointIPAMConfig) bool {
|
|
|
|
return ipamConfig != nil && (len(ipamConfig.IPv4Address) > 0 || len(ipamConfig.IPv6Address) > 0)
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// User specified ip address is acceptable only for networks with user specified subnets.
|
|
|
|
func validateNetworkingConfig(n libnetwork.Network, epConfig *networktypes.EndpointSettings) error {
|
|
|
|
if n == nil || epConfig == nil {
|
|
|
|
return nil
|
|
|
|
}
|
2019-03-20 05:15:10 -04:00
|
|
|
if !containertypes.NetworkMode(n.Name()).IsUserDefined() {
|
|
|
|
if hasUserDefinedIPAddress(epConfig.IPAMConfig) && !enableIPOnPredefinedNetwork() {
|
|
|
|
return runconfig.ErrUnsupportedNetworkAndIP
|
|
|
|
}
|
|
|
|
if len(epConfig.Aliases) > 0 && !serviceDiscoveryOnDefaultNetwork() {
|
|
|
|
return runconfig.ErrUnsupportedNetworkAndAlias
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !hasUserDefinedIPAddress(epConfig.IPAMConfig) {
|
2016-03-09 23:33:21 -05:00
|
|
|
return nil
|
|
|
|
}
|
2019-03-20 05:15:10 -04:00
|
|
|
|
2016-03-09 23:33:21 -05:00
|
|
|
_, _, nwIPv4Configs, nwIPv6Configs := n.Info().IpamConfig()
|
|
|
|
for _, s := range []struct {
|
|
|
|
ipConfigured bool
|
|
|
|
subnetConfigs []*libnetwork.IpamConf
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
ipConfigured: len(epConfig.IPAMConfig.IPv4Address) > 0,
|
|
|
|
subnetConfigs: nwIPv4Configs,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
ipConfigured: len(epConfig.IPAMConfig.IPv6Address) > 0,
|
|
|
|
subnetConfigs: nwIPv6Configs,
|
|
|
|
},
|
|
|
|
} {
|
|
|
|
if s.ipConfigured {
|
|
|
|
foundSubnet := false
|
|
|
|
for _, cfg := range s.subnetConfigs {
|
|
|
|
if len(cfg.PreferredPool) > 0 {
|
|
|
|
foundSubnet = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !foundSubnet {
|
|
|
|
return runconfig.ErrUnsupportedNetworkNoSubnetAndIP
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// cleanOperationalData resets the operational data from the passed endpoint settings
|
2016-08-23 19:50:15 -04:00
|
|
|
func cleanOperationalData(es *network.EndpointSettings) {
|
2016-03-09 23:33:21 -05:00
|
|
|
es.EndpointID = ""
|
|
|
|
es.Gateway = ""
|
|
|
|
es.IPAddress = ""
|
|
|
|
es.IPPrefixLen = 0
|
|
|
|
es.IPv6Gateway = ""
|
|
|
|
es.GlobalIPv6Address = ""
|
|
|
|
es.GlobalIPv6PrefixLen = 0
|
|
|
|
es.MacAddress = ""
|
2016-08-23 19:50:15 -04:00
|
|
|
if es.IPAMOperational {
|
|
|
|
es.IPAMConfig = nil
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
2016-08-23 19:50:15 -04:00
|
|
|
}
|
2016-03-09 23:33:21 -05:00
|
|
|
|
2016-08-23 19:50:15 -04:00
|
|
|
func (daemon *Daemon) updateNetworkConfig(container *container.Container, n libnetwork.Network, endpointConfig *networktypes.EndpointSettings, updateSettings bool) error {
|
2016-09-12 20:17:09 -04:00
|
|
|
|
2019-03-20 05:15:10 -04:00
|
|
|
if containertypes.NetworkMode(n.Name()).IsUserDefined() {
|
2016-04-08 18:25:07 -04:00
|
|
|
addShortID := true
|
|
|
|
shortID := stringid.TruncateID(container.ID)
|
|
|
|
for _, alias := range endpointConfig.Aliases {
|
|
|
|
if alias == shortID {
|
|
|
|
addShortID = false
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if addShortID {
|
|
|
|
endpointConfig.Aliases = append(endpointConfig.Aliases, shortID)
|
|
|
|
}
|
2019-05-11 09:09:42 -04:00
|
|
|
if container.Name != container.Config.Hostname {
|
|
|
|
addHostname := true
|
|
|
|
for _, alias := range endpointConfig.Aliases {
|
|
|
|
if alias == container.Config.Hostname {
|
|
|
|
addHostname = false
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if addHostname {
|
|
|
|
endpointConfig.Aliases = append(endpointConfig.Aliases, container.Config.Hostname)
|
|
|
|
}
|
|
|
|
}
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := validateNetworkingConfig(n, endpointConfig); err != nil {
|
2016-08-23 19:50:15 -04:00
|
|
|
return err
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
if updateSettings {
|
2016-08-23 19:50:15 -04:00
|
|
|
if err := daemon.updateNetworkSettings(container, n, endpointConfig); err != nil {
|
|
|
|
return err
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
|
|
|
}
|
2016-08-23 19:50:15 -04:00
|
|
|
return nil
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
func (daemon *Daemon) connectToNetwork(container *container.Container, idOrName string, endpointConfig *networktypes.EndpointSettings, updateSettings bool) (err error) {
|
2016-07-20 19:11:28 -04:00
|
|
|
start := time.Now()
|
2016-08-23 19:50:15 -04:00
|
|
|
if container.HostConfig.NetworkMode.IsContainer() {
|
|
|
|
return runconfig.ErrConflictSharedNetwork
|
|
|
|
}
|
|
|
|
if containertypes.NetworkMode(idOrName).IsBridge() &&
|
|
|
|
daemon.configStore.DisableBridge {
|
|
|
|
container.Config.NetworkDisabled = true
|
|
|
|
return nil
|
|
|
|
}
|
2016-04-08 18:25:07 -04:00
|
|
|
if endpointConfig == nil {
|
|
|
|
endpointConfig = &networktypes.EndpointSettings{}
|
|
|
|
}
|
2016-08-23 19:50:15 -04:00
|
|
|
|
|
|
|
n, config, err := daemon.findAndAttachNetwork(container, idOrName, endpointConfig)
|
2016-03-09 23:33:21 -05:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if n == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-08-23 19:50:15 -04:00
|
|
|
var operIPAM bool
|
|
|
|
if config != nil {
|
|
|
|
if epConfig, ok := config.EndpointsConfig[n.Name()]; ok {
|
|
|
|
if endpointConfig.IPAMConfig == nil ||
|
|
|
|
(endpointConfig.IPAMConfig.IPv4Address == "" &&
|
|
|
|
endpointConfig.IPAMConfig.IPv6Address == "" &&
|
|
|
|
len(endpointConfig.IPAMConfig.LinkLocalIPs) == 0) {
|
|
|
|
operIPAM = true
|
|
|
|
}
|
|
|
|
|
2016-10-29 18:02:15 -04:00
|
|
|
// copy IPAMConfig and NetworkID from epConfig via AttachNetwork
|
|
|
|
endpointConfig.IPAMConfig = epConfig.IPAMConfig
|
|
|
|
endpointConfig.NetworkID = epConfig.NetworkID
|
2016-08-23 19:50:15 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-20 05:16:22 -04:00
|
|
|
if err := daemon.updateNetworkConfig(container, n, endpointConfig, updateSettings); err != nil {
|
2016-08-23 19:50:15 -04:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2016-03-09 23:33:21 -05:00
|
|
|
controller := daemon.netController
|
|
|
|
sb := daemon.getNetworkSandbox(container)
|
2018-05-10 16:44:09 -04:00
|
|
|
createOptions, err := buildCreateEndpointOptions(container, n, endpointConfig, sb, daemon.configStore.DNS)
|
2016-03-09 23:33:21 -05:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
endpointName := strings.TrimPrefix(container.Name, "/")
|
|
|
|
ep, err := n.CreateEndpoint(endpointName, createOptions...)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
if err != nil {
|
|
|
|
if e := ep.Delete(false); e != nil {
|
|
|
|
logrus.Warnf("Could not rollback container connection to network %s", idOrName)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
2016-08-23 19:50:15 -04:00
|
|
|
container.NetworkSettings.Networks[n.Name()] = &network.EndpointSettings{
|
|
|
|
EndpointSettings: endpointConfig,
|
|
|
|
IPAMOperational: operIPAM,
|
|
|
|
}
|
2019-10-13 16:10:24 -04:00
|
|
|
|
|
|
|
delete(container.NetworkSettings.Networks, n.ID())
|
2016-03-09 23:33:21 -05:00
|
|
|
|
|
|
|
if err := daemon.updateEndpointNetworkSettings(container, n, ep); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if sb == nil {
|
2019-08-09 08:10:07 -04:00
|
|
|
sbOptions, err := daemon.buildSandboxOptions(container)
|
2016-03-09 23:33:21 -05:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-08-09 08:10:07 -04:00
|
|
|
sb, err = controller.NewSandbox(container.ID, sbOptions...)
|
2016-03-09 23:33:21 -05:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-05-10 16:44:09 -04:00
|
|
|
updateSandboxNetworkSettings(container, sb)
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
|
|
|
|
2018-05-10 16:44:09 -04:00
|
|
|
joinOptions, err := buildJoinOptions(container.NetworkSettings, n)
|
2016-03-09 23:33:21 -05:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := ep.Join(sb, joinOptions...); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2016-09-18 02:30:39 -04:00
|
|
|
if !container.Managed {
|
|
|
|
// add container name/alias to DNS
|
|
|
|
if err := daemon.ActivateContainerServiceBinding(container.Name); err != nil {
|
|
|
|
return fmt.Errorf("Activate container service binding for %s failed: %v", container.Name, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-05-10 16:44:09 -04:00
|
|
|
if err := updateJoinInfo(container.NetworkSettings, n, ep); err != nil {
|
2016-03-09 23:33:21 -05:00
|
|
|
return fmt.Errorf("Updating join info failed: %v", err)
|
|
|
|
}
|
|
|
|
|
2016-05-25 16:47:38 -04:00
|
|
|
container.NetworkSettings.Ports = getPortMapInfo(sb)
|
|
|
|
|
2016-03-09 23:33:21 -05:00
|
|
|
daemon.LogNetworkEventWithAttributes(n, "connect", map[string]string{"container": container.ID})
|
2016-07-20 19:11:28 -04:00
|
|
|
networkActions.WithValues("connect").UpdateSince(start)
|
2016-03-09 23:33:21 -05:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-03-12 19:37:35 -04:00
|
|
|
func updateJoinInfo(networkSettings *network.Settings, n libnetwork.Network, ep libnetwork.Endpoint) error {
|
2018-05-10 16:44:09 -04:00
|
|
|
if ep == nil {
|
|
|
|
return errors.New("invalid enppoint whhile building portmap info")
|
|
|
|
}
|
|
|
|
|
|
|
|
if networkSettings == nil {
|
|
|
|
return errors.New("invalid network settings while building port map info")
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(networkSettings.Ports) == 0 {
|
|
|
|
pm, err := getEndpointPortMapInfo(ep)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
networkSettings.Ports = pm
|
|
|
|
}
|
|
|
|
|
|
|
|
epInfo := ep.Info()
|
|
|
|
if epInfo == nil {
|
|
|
|
// It is not an error to get an empty endpoint info
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
if epInfo.Gateway() != nil {
|
|
|
|
networkSettings.Networks[n.Name()].Gateway = epInfo.Gateway().String()
|
|
|
|
}
|
|
|
|
if epInfo.GatewayIPv6().To16() != nil {
|
|
|
|
networkSettings.Networks[n.Name()].IPv6Gateway = epInfo.GatewayIPv6().String()
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-08-26 16:08:28 -04:00
|
|
|
// ForceEndpointDelete deletes an endpoint from a network forcefully
|
|
|
|
func (daemon *Daemon) ForceEndpointDelete(name string, networkName string) error {
|
2018-01-15 12:26:43 -05:00
|
|
|
n, err := daemon.FindNetwork(networkName)
|
2016-08-26 16:08:28 -04:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2016-03-09 23:33:21 -05:00
|
|
|
ep, err := n.EndpointByName(name)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return ep.Delete(true)
|
|
|
|
}
|
|
|
|
|
2016-08-23 19:50:15 -04:00
|
|
|
func (daemon *Daemon) disconnectFromNetwork(container *container.Container, n libnetwork.Network, force bool) error {
|
2016-03-09 23:33:21 -05:00
|
|
|
var (
|
|
|
|
ep libnetwork.Endpoint
|
|
|
|
sbox libnetwork.Sandbox
|
|
|
|
)
|
|
|
|
|
|
|
|
s := func(current libnetwork.Endpoint) bool {
|
|
|
|
epInfo := current.Info()
|
|
|
|
if epInfo == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if sb := epInfo.Sandbox(); sb != nil {
|
|
|
|
if sb.ContainerID() == container.ID {
|
|
|
|
ep = current
|
|
|
|
sbox = sb
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
n.WalkEndpoints(s)
|
|
|
|
|
|
|
|
if ep == nil && force {
|
|
|
|
epName := strings.TrimPrefix(container.Name, "/")
|
|
|
|
ep, err := n.EndpointByName(epName)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return ep.Delete(force)
|
|
|
|
}
|
|
|
|
|
|
|
|
if ep == nil {
|
2016-12-26 11:36:12 -05:00
|
|
|
return fmt.Errorf("container %s is not connected to network %s", container.ID, n.Name())
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := ep.Leave(sbox); err != nil {
|
|
|
|
return fmt.Errorf("container %s failed to leave network %s: %v", container.ID, n.Name(), err)
|
|
|
|
}
|
|
|
|
|
2016-05-25 16:47:38 -04:00
|
|
|
container.NetworkSettings.Ports = getPortMapInfo(sbox)
|
|
|
|
|
2016-03-09 23:33:21 -05:00
|
|
|
if err := ep.Delete(false); err != nil {
|
|
|
|
return fmt.Errorf("endpoint delete failed for container %s on network %s: %v", container.ID, n.Name(), err)
|
|
|
|
}
|
|
|
|
|
|
|
|
delete(container.NetworkSettings.Networks, n.Name())
|
2016-08-23 19:50:15 -04:00
|
|
|
|
2017-02-28 05:11:59 -05:00
|
|
|
daemon.tryDetachContainerFromClusterNetwork(n, container)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (daemon *Daemon) tryDetachContainerFromClusterNetwork(network libnetwork.Network, container *container.Container) {
|
|
|
|
if daemon.clusterProvider != nil && network.Info().Dynamic() && !container.Managed {
|
|
|
|
if err := daemon.clusterProvider.DetachNetwork(network.Name(), container.ID); err != nil {
|
|
|
|
logrus.Warnf("error detaching from network %s: %v", network.Name(), err)
|
|
|
|
if err := daemon.clusterProvider.DetachNetwork(network.ID(), container.ID); err != nil {
|
|
|
|
logrus.Warnf("error detaching from network %s: %v", network.ID(), err)
|
2016-11-03 18:44:45 -04:00
|
|
|
}
|
2016-08-23 19:50:15 -04:00
|
|
|
}
|
|
|
|
}
|
2017-02-28 05:11:59 -05:00
|
|
|
attributes := map[string]string{
|
|
|
|
"container": container.ID,
|
|
|
|
}
|
|
|
|
daemon.LogNetworkEventWithAttributes(network, "disconnect", attributes)
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
func (daemon *Daemon) initializeNetworking(container *container.Container) error {
|
|
|
|
var err error
|
|
|
|
|
|
|
|
if container.HostConfig.NetworkMode.IsContainer() {
|
|
|
|
// we need to get the hosts files from the container to join
|
|
|
|
nc, err := daemon.getNetworkedContainer(container.ID, container.HostConfig.NetworkMode.ConnectedContainer())
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2017-06-12 18:20:23 -04:00
|
|
|
|
|
|
|
err = daemon.initializeNetworkingPaths(container, nc)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2016-03-09 23:33:21 -05:00
|
|
|
container.Config.Hostname = nc.Config.Hostname
|
|
|
|
container.Config.Domainname = nc.Config.Domainname
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if container.HostConfig.NetworkMode.IsHost() {
|
2016-12-05 11:56:42 -05:00
|
|
|
if container.Config.Hostname == "" {
|
|
|
|
container.Config.Hostname, err = os.Hostname()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := daemon.allocateNetwork(container); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return container.BuildHostnameFile()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (daemon *Daemon) getNetworkedContainer(containerID, connectedContainerID string) (*container.Container, error) {
|
|
|
|
nc, err := daemon.GetContainer(connectedContainerID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if containerID == nc.ID {
|
|
|
|
return nil, fmt.Errorf("cannot join own network")
|
|
|
|
}
|
|
|
|
if !nc.IsRunning() {
|
|
|
|
err := fmt.Errorf("cannot join network of a non running container: %s", connectedContainerID)
|
2017-11-28 23:09:37 -05:00
|
|
|
return nil, errdefs.Conflict(err)
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
|
|
|
if nc.IsRestarting() {
|
|
|
|
return nil, errContainerIsRestarting(connectedContainerID)
|
|
|
|
}
|
|
|
|
return nc, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (daemon *Daemon) releaseNetwork(container *container.Container) {
|
2016-07-20 19:11:28 -04:00
|
|
|
start := time.Now()
|
2016-06-14 12:13:53 -04:00
|
|
|
if daemon.netController == nil {
|
|
|
|
return
|
|
|
|
}
|
2016-03-09 23:33:21 -05:00
|
|
|
if container.HostConfig.NetworkMode.IsContainer() || container.Config.NetworkDisabled {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
sid := container.NetworkSettings.SandboxID
|
|
|
|
settings := container.NetworkSettings.Networks
|
|
|
|
container.NetworkSettings.Ports = nil
|
|
|
|
|
2017-03-22 02:51:52 -04:00
|
|
|
if sid == "" {
|
2016-03-09 23:33:21 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var networks []libnetwork.Network
|
|
|
|
for n, epSettings := range settings {
|
2018-01-15 12:26:43 -05:00
|
|
|
if nw, err := daemon.FindNetwork(getNetworkID(n, epSettings.EndpointSettings)); err == nil {
|
2016-03-09 23:33:21 -05:00
|
|
|
networks = append(networks, nw)
|
|
|
|
}
|
2016-08-23 19:50:15 -04:00
|
|
|
|
|
|
|
if epSettings.EndpointSettings == nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2016-03-09 23:33:21 -05:00
|
|
|
cleanOperationalData(epSettings)
|
|
|
|
}
|
|
|
|
|
|
|
|
sb, err := daemon.netController.SandboxByID(sid)
|
|
|
|
if err != nil {
|
2016-03-29 18:27:04 -04:00
|
|
|
logrus.Warnf("error locating sandbox id %s: %v", sid, err)
|
2016-03-09 23:33:21 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := sb.Delete(); err != nil {
|
|
|
|
logrus.Errorf("Error deleting sandbox id %s for container %s: %v", sid, container.ID, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, nw := range networks {
|
2017-02-28 05:11:59 -05:00
|
|
|
daemon.tryDetachContainerFromClusterNetwork(nw, container)
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
2016-07-20 19:11:28 -04:00
|
|
|
networkActions.WithValues("release").UpdateSince(start)
|
2016-03-09 23:33:21 -05:00
|
|
|
}
|
2016-09-21 15:02:20 -04:00
|
|
|
|
|
|
|
func errRemovalContainer(containerID string) error {
|
|
|
|
return fmt.Errorf("Container %s is marked for removal and cannot be connected or disconnected to the network", containerID)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ConnectToNetwork connects a container to a network
|
|
|
|
func (daemon *Daemon) ConnectToNetwork(container *container.Container, idOrName string, endpointConfig *networktypes.EndpointSettings) error {
|
|
|
|
if endpointConfig == nil {
|
|
|
|
endpointConfig = &networktypes.EndpointSettings{}
|
|
|
|
}
|
2017-05-31 14:52:43 -04:00
|
|
|
container.Lock()
|
|
|
|
defer container.Unlock()
|
|
|
|
|
2016-09-21 15:02:20 -04:00
|
|
|
if !container.Running {
|
|
|
|
if container.RemovalInProgress || container.Dead {
|
|
|
|
return errRemovalContainer(container.ID)
|
|
|
|
}
|
|
|
|
|
2018-01-15 12:26:43 -05:00
|
|
|
n, err := daemon.FindNetwork(idOrName)
|
2016-09-21 15:02:20 -04:00
|
|
|
if err == nil && n != nil {
|
|
|
|
if err := daemon.updateNetworkConfig(container, n, endpointConfig, true); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
container.NetworkSettings.Networks[idOrName] = &network.EndpointSettings{
|
|
|
|
EndpointSettings: endpointConfig,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if err := daemon.connectToNetwork(container, idOrName, endpointConfig, true); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2017-02-23 18:12:18 -05:00
|
|
|
|
2017-06-22 10:46:26 -04:00
|
|
|
return container.CheckpointTo(daemon.containersReplica)
|
2016-09-21 15:02:20 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// DisconnectFromNetwork disconnects container from network n.
|
|
|
|
func (daemon *Daemon) DisconnectFromNetwork(container *container.Container, networkName string, force bool) error {
|
2018-01-15 12:26:43 -05:00
|
|
|
n, err := daemon.FindNetwork(networkName)
|
2017-05-31 14:52:43 -04:00
|
|
|
container.Lock()
|
|
|
|
defer container.Unlock()
|
|
|
|
|
2016-09-21 15:02:20 -04:00
|
|
|
if !container.Running || (err != nil && force) {
|
|
|
|
if container.RemovalInProgress || container.Dead {
|
|
|
|
return errRemovalContainer(container.ID)
|
|
|
|
}
|
|
|
|
// In case networkName is resolved we will use n.Name()
|
|
|
|
// this will cover the case where network id is passed.
|
|
|
|
if n != nil {
|
|
|
|
networkName = n.Name()
|
|
|
|
}
|
|
|
|
if _, ok := container.NetworkSettings.Networks[networkName]; !ok {
|
|
|
|
return fmt.Errorf("container %s is not connected to the network %s", container.ID, networkName)
|
|
|
|
}
|
|
|
|
delete(container.NetworkSettings.Networks, networkName)
|
|
|
|
} else if err == nil {
|
|
|
|
if container.HostConfig.NetworkMode.IsHost() && containertypes.NetworkMode(n.Type()).IsHost() {
|
|
|
|
return runconfig.ErrConflictHostNetwork
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := daemon.disconnectFromNetwork(container, n, false); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-06-22 10:46:26 -04:00
|
|
|
if err := container.CheckpointTo(daemon.containersReplica); err != nil {
|
2017-02-23 18:12:18 -05:00
|
|
|
return err
|
2016-09-21 15:02:20 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if n != nil {
|
2017-02-22 17:02:20 -05:00
|
|
|
daemon.LogNetworkEventWithAttributes(n, "disconnect", map[string]string{
|
2016-09-21 15:02:20 -04:00
|
|
|
"container": container.ID,
|
2017-02-22 17:02:20 -05:00
|
|
|
})
|
2016-09-21 15:02:20 -04:00
|
|
|
}
|
2017-02-22 17:02:20 -05:00
|
|
|
|
2016-09-21 15:02:20 -04:00
|
|
|
return nil
|
|
|
|
}
|
2016-09-18 02:30:39 -04:00
|
|
|
|
|
|
|
// ActivateContainerServiceBinding puts this container into load balancer active rotation and DNS response
|
|
|
|
func (daemon *Daemon) ActivateContainerServiceBinding(containerName string) error {
|
2019-08-09 08:10:07 -04:00
|
|
|
ctr, err := daemon.GetContainer(containerName)
|
2016-09-18 02:30:39 -04:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-08-09 08:10:07 -04:00
|
|
|
sb := daemon.getNetworkSandbox(ctr)
|
2016-09-18 02:30:39 -04:00
|
|
|
if sb == nil {
|
2016-11-25 09:58:20 -05:00
|
|
|
return fmt.Errorf("network sandbox does not exist for container %s", containerName)
|
2016-09-18 02:30:39 -04:00
|
|
|
}
|
|
|
|
return sb.EnableService()
|
|
|
|
}
|
|
|
|
|
2016-12-28 11:29:15 -05:00
|
|
|
// DeactivateContainerServiceBinding removes this container from load balancer active rotation, and DNS response
|
2016-09-18 02:30:39 -04:00
|
|
|
func (daemon *Daemon) DeactivateContainerServiceBinding(containerName string) error {
|
2019-08-09 08:10:07 -04:00
|
|
|
ctr, err := daemon.GetContainer(containerName)
|
2016-09-18 02:30:39 -04:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-08-09 08:10:07 -04:00
|
|
|
sb := daemon.getNetworkSandbox(ctr)
|
2016-09-18 02:30:39 -04:00
|
|
|
if sb == nil {
|
2017-04-10 12:06:09 -04:00
|
|
|
// If the network sandbox is not found, then there is nothing to deactivate
|
|
|
|
logrus.Debugf("Could not find network sandbox for container %s on service binding deactivation request", containerName)
|
|
|
|
return nil
|
2016-09-18 02:30:39 -04:00
|
|
|
}
|
|
|
|
return sb.DisableService()
|
|
|
|
}
|
2017-10-31 15:46:53 -04:00
|
|
|
|
|
|
|
func getNetworkID(name string, endpointSettings *networktypes.EndpointSettings) string {
|
|
|
|
// We only want to prefer NetworkID for user defined networks.
|
|
|
|
// For systems like bridge, none, etc. the name is preferred (otherwise restart may cause issues)
|
|
|
|
if containertypes.NetworkMode(name).IsUserDefined() && endpointSettings != nil && endpointSettings.NetworkID != "" {
|
|
|
|
return endpointSettings.NetworkID
|
|
|
|
}
|
|
|
|
return name
|
|
|
|
}
|
2018-05-10 16:44:09 -04:00
|
|
|
|
|
|
|
// updateSandboxNetworkSettings updates the sandbox ID and Key.
|
|
|
|
func updateSandboxNetworkSettings(c *container.Container, sb libnetwork.Sandbox) error {
|
|
|
|
c.NetworkSettings.SandboxID = sb.ID()
|
|
|
|
c.NetworkSettings.SandboxKey = sb.Key()
|
|
|
|
return nil
|
|
|
|
}
|