2021-08-23 09:14:53 -04:00
|
|
|
//go:build linux
|
2015-05-20 15:28:58 -04:00
|
|
|
// +build linux
|
2021-08-23 09:14:53 -04:00
|
|
|
|
2015-05-20 15:28:58 -04:00
|
|
|
// Network utility functions.
|
|
|
|
|
|
|
|
package netutils
|
|
|
|
|
|
|
|
import (
|
2016-02-26 17:58:11 -05:00
|
|
|
"fmt"
|
2015-05-20 15:28:58 -04:00
|
|
|
"net"
|
|
|
|
"strings"
|
|
|
|
|
2021-04-05 20:24:47 -04:00
|
|
|
"github.com/docker/docker/libnetwork/ipamutils"
|
|
|
|
"github.com/docker/docker/libnetwork/ns"
|
|
|
|
"github.com/docker/docker/libnetwork/osl"
|
|
|
|
"github.com/docker/docker/libnetwork/resolvconf"
|
|
|
|
"github.com/docker/docker/libnetwork/types"
|
2019-04-01 14:14:54 -04:00
|
|
|
"github.com/pkg/errors"
|
2015-05-20 15:28:58 -04:00
|
|
|
"github.com/vishvananda/netlink"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2016-05-16 14:51:40 -04:00
|
|
|
networkGetRoutesFct func(netlink.Link, int) ([]netlink.Route, error)
|
2015-05-20 15:28:58 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
// CheckRouteOverlaps checks whether the passed network overlaps with any existing routes
|
|
|
|
func CheckRouteOverlaps(toCheck *net.IPNet) error {
|
2016-05-16 14:51:40 -04:00
|
|
|
if networkGetRoutesFct == nil {
|
|
|
|
networkGetRoutesFct = ns.NlHandle().RouteList
|
|
|
|
}
|
2015-05-20 15:28:58 -04:00
|
|
|
networks, err := networkGetRoutesFct(nil, netlink.FAMILY_V4)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
for _, network := range networks {
|
2021-07-05 10:54:13 -04:00
|
|
|
if network.Dst != nil && network.Scope == netlink.SCOPE_LINK && NetworkOverlaps(toCheck, network.Dst) {
|
2015-05-20 15:28:58 -04:00
|
|
|
return ErrNetworkOverlaps
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// GenerateIfaceName returns an interface name using the passed in
|
|
|
|
// prefix and the length of random bytes. The api ensures that the
|
|
|
|
// there are is no interface which exists with that name.
|
2016-05-16 14:51:40 -04:00
|
|
|
func GenerateIfaceName(nlh *netlink.Handle, prefix string, len int) (string, error) {
|
|
|
|
linkByName := netlink.LinkByName
|
|
|
|
if nlh != nil {
|
|
|
|
linkByName = nlh.LinkByName
|
|
|
|
}
|
2015-05-20 15:28:58 -04:00
|
|
|
for i := 0; i < 3; i++ {
|
|
|
|
name, err := GenerateRandomName(prefix, len)
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
2016-05-16 14:51:40 -04:00
|
|
|
_, err = linkByName(name)
|
|
|
|
if err != nil {
|
2015-05-20 15:28:58 -04:00
|
|
|
if strings.Contains(err.Error(), "not found") {
|
|
|
|
return name, nil
|
|
|
|
}
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return "", types.InternalErrorf("could not generate interface name")
|
|
|
|
}
|
2016-02-26 17:58:11 -05:00
|
|
|
|
|
|
|
// ElectInterfaceAddresses looks for an interface on the OS with the
|
2016-09-17 01:40:44 -04:00
|
|
|
// specified name and returns returns all its IPv4 and IPv6 addresses in CIDR notation.
|
|
|
|
// If a failure in retrieving the addresses or no IPv4 address is found, an error is returned.
|
|
|
|
// If the interface does not exist, it chooses from a predefined
|
2016-02-26 17:58:11 -05:00
|
|
|
// list the first IPv4 address which does not conflict with other
|
|
|
|
// interfaces on the system.
|
2016-09-17 01:40:44 -04:00
|
|
|
func ElectInterfaceAddresses(name string) ([]*net.IPNet, []*net.IPNet, error) {
|
2020-10-31 12:57:38 -04:00
|
|
|
var v4Nets, v6Nets []*net.IPNet
|
2016-02-26 17:58:11 -05:00
|
|
|
|
|
|
|
defer osl.InitOSContext()()
|
|
|
|
|
2016-05-16 14:51:40 -04:00
|
|
|
link, _ := ns.NlHandle().LinkByName(name)
|
2016-02-26 17:58:11 -05:00
|
|
|
if link != nil {
|
2016-05-16 14:51:40 -04:00
|
|
|
v4addr, err := ns.NlHandle().AddrList(link, netlink.FAMILY_V4)
|
2016-02-26 17:58:11 -05:00
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
2016-05-16 14:51:40 -04:00
|
|
|
v6addr, err := ns.NlHandle().AddrList(link, netlink.FAMILY_V6)
|
2016-02-26 17:58:11 -05:00
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
2016-09-17 01:40:44 -04:00
|
|
|
for _, nlAddr := range v4addr {
|
|
|
|
v4Nets = append(v4Nets, nlAddr.IPNet)
|
2016-02-26 17:58:11 -05:00
|
|
|
}
|
|
|
|
for _, nlAddr := range v6addr {
|
|
|
|
v6Nets = append(v6Nets, nlAddr.IPNet)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-09-17 01:40:44 -04:00
|
|
|
if link == nil || len(v4Nets) == 0 {
|
2018-11-26 00:51:27 -05:00
|
|
|
// Choose from predefined local scope networks
|
2018-07-24 15:46:59 -04:00
|
|
|
v4Net, err := FindAvailableNetwork(ipamutils.PredefinedLocalScopeDefaultNetworks)
|
2016-02-26 17:58:11 -05:00
|
|
|
if err != nil {
|
2019-04-01 14:14:54 -04:00
|
|
|
return nil, nil, errors.Wrapf(err, "PredefinedLocalScopeDefaultNetworks List: %+v",
|
2018-11-26 00:51:27 -05:00
|
|
|
ipamutils.PredefinedLocalScopeDefaultNetworks)
|
2016-02-26 17:58:11 -05:00
|
|
|
}
|
2016-09-17 01:40:44 -04:00
|
|
|
v4Nets = append(v4Nets, v4Net)
|
2016-02-26 17:58:11 -05:00
|
|
|
}
|
|
|
|
|
2016-09-17 01:40:44 -04:00
|
|
|
return v4Nets, v6Nets, nil
|
2016-02-26 17:58:11 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// FindAvailableNetwork returns a network from the passed list which does not
|
|
|
|
// overlap with existing interfaces in the system
|
|
|
|
func FindAvailableNetwork(list []*net.IPNet) (*net.IPNet, error) {
|
|
|
|
// We don't check for an error here, because we don't really care if we
|
|
|
|
// can't read /etc/resolv.conf. So instead we skip the append if resolvConf
|
|
|
|
// is nil. It either doesn't exist, or we can't read it for some reason.
|
|
|
|
var nameservers []string
|
|
|
|
if rc, err := resolvconf.Get(); err == nil {
|
|
|
|
nameservers = resolvconf.GetNameserversAsCIDR(rc.Content)
|
|
|
|
}
|
|
|
|
for _, nw := range list {
|
|
|
|
if err := CheckNameserverOverlaps(nameservers, nw); err == nil {
|
|
|
|
if err := CheckRouteOverlaps(nw); err == nil {
|
|
|
|
return nw, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil, fmt.Errorf("no available network")
|
|
|
|
}
|