2021-05-25 19:48:54 -04:00
|
|
|
// +build linux
|
|
|
|
|
2016-02-16 22:15:18 -05:00
|
|
|
package macvlan
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
|
|
|
|
"github.com/docker/docker/pkg/stringid"
|
2021-04-05 20:24:47 -04:00
|
|
|
"github.com/docker/docker/libnetwork/driverapi"
|
|
|
|
"github.com/docker/docker/libnetwork/netlabel"
|
|
|
|
"github.com/docker/docker/libnetwork/ns"
|
|
|
|
"github.com/docker/docker/libnetwork/options"
|
|
|
|
"github.com/docker/docker/libnetwork/osl"
|
|
|
|
"github.com/docker/docker/libnetwork/types"
|
2017-07-26 17:18:31 -04:00
|
|
|
"github.com/sirupsen/logrus"
|
2016-02-16 22:15:18 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
// CreateNetwork the network for the specified driver type
|
2016-04-18 22:55:39 -04:00
|
|
|
func (d *driver) CreateNetwork(nid string, option map[string]interface{}, nInfo driverapi.NetworkInfo, ipV4Data, ipV6Data []driverapi.IPAMData) error {
|
2016-03-10 16:23:04 -05:00
|
|
|
defer osl.InitOSContext()()
|
2020-08-31 14:39:53 -04:00
|
|
|
|
2016-03-13 00:42:00 -05:00
|
|
|
// reject a null v4 network
|
|
|
|
if len(ipV4Data) == 0 || ipV4Data[0].Pool.String() == "0.0.0.0/0" {
|
|
|
|
return fmt.Errorf("ipv4 pool is empty")
|
|
|
|
}
|
2016-02-16 22:15:18 -05:00
|
|
|
// parse and validate the config and bind to networkConfiguration
|
2016-03-02 20:13:15 -05:00
|
|
|
config, err := parseNetworkOptions(nid, option)
|
2016-02-16 22:15:18 -05:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-03-02 20:13:15 -05:00
|
|
|
config.ID = nid
|
|
|
|
err = config.processIPAM(nid, ipV4Data, ipV6Data)
|
2016-02-16 22:15:18 -05:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
// verify the macvlan mode from -o macvlan_mode option
|
|
|
|
switch config.MacvlanMode {
|
|
|
|
case "", modeBridge:
|
|
|
|
// default to macvlan bridge mode if -o macvlan_mode is empty
|
|
|
|
config.MacvlanMode = modeBridge
|
2016-09-23 06:51:16 -04:00
|
|
|
case modePrivate:
|
|
|
|
config.MacvlanMode = modePrivate
|
2016-02-16 22:15:18 -05:00
|
|
|
case modePassthru:
|
|
|
|
config.MacvlanMode = modePassthru
|
|
|
|
case modeVepa:
|
|
|
|
config.MacvlanMode = modeVepa
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("requested macvlan mode '%s' is not valid, 'bridge' mode is the macvlan driver default", config.MacvlanMode)
|
|
|
|
}
|
2016-03-02 20:13:15 -05:00
|
|
|
// loopback is not a valid parent link
|
|
|
|
if config.Parent == "lo" {
|
|
|
|
return fmt.Errorf("loopback interface is not a valid %s parent link", macvlanType)
|
|
|
|
}
|
|
|
|
// if parent interface not specified, create a dummy type link to use named dummy+net_id
|
|
|
|
if config.Parent == "" {
|
|
|
|
config.Parent = getDummyName(stringid.TruncateID(config.ID))
|
|
|
|
}
|
2019-07-08 16:52:31 -04:00
|
|
|
foundExisting, err := d.createNetwork(config)
|
2016-02-16 22:15:18 -05:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-07-08 16:52:31 -04:00
|
|
|
|
|
|
|
if foundExisting {
|
|
|
|
return types.InternalMaskableErrorf("restoring existing network %s", config.ID)
|
|
|
|
}
|
|
|
|
|
2016-02-16 22:15:18 -05:00
|
|
|
// update persistent db, rollback on fail
|
|
|
|
err = d.storeUpdate(config)
|
|
|
|
if err != nil {
|
|
|
|
d.deleteNetwork(config.ID)
|
2017-05-21 22:25:52 -04:00
|
|
|
logrus.Debugf("encountered an error rolling back a network create for %s : %v", config.ID, err)
|
2016-02-16 22:15:18 -05:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// createNetwork is used by new network callbacks and persistent network cache
|
2019-07-08 16:52:31 -04:00
|
|
|
func (d *driver) createNetwork(config *configuration) (bool, error) {
|
|
|
|
foundExisting := false
|
2016-02-16 22:15:18 -05:00
|
|
|
networkList := d.getNetworks()
|
|
|
|
for _, nw := range networkList {
|
2016-03-02 20:13:15 -05:00
|
|
|
if config.Parent == nw.config.Parent {
|
2019-07-08 16:52:31 -04:00
|
|
|
if config.ID != nw.config.ID {
|
|
|
|
return false, fmt.Errorf("network %s is already using parent interface %s",
|
|
|
|
getDummyName(stringid.TruncateID(nw.config.ID)), config.Parent)
|
|
|
|
}
|
|
|
|
logrus.Debugf("Create Network for the same ID %s\n", config.ID)
|
|
|
|
foundExisting = true
|
|
|
|
break
|
2016-02-16 22:15:18 -05:00
|
|
|
}
|
|
|
|
}
|
2016-03-02 20:13:15 -05:00
|
|
|
if !parentExists(config.Parent) {
|
2020-03-03 17:42:42 -05:00
|
|
|
// Create a dummy link if a dummy name is set for parent
|
|
|
|
if dummyName := getDummyName(stringid.TruncateID(config.ID)); dummyName == config.Parent {
|
|
|
|
err := createDummyLink(config.Parent, dummyName)
|
2016-03-02 20:13:15 -05:00
|
|
|
if err != nil {
|
2019-07-24 20:06:04 -04:00
|
|
|
return false, err
|
2016-03-02 20:13:15 -05:00
|
|
|
}
|
|
|
|
config.CreatedSlaveLink = true
|
2020-03-03 17:42:42 -05:00
|
|
|
// notify the user in logs that they have limited communications
|
|
|
|
logrus.Debugf("Empty -o parent= limit communications to other containers inside of network: %s",
|
|
|
|
config.Parent)
|
2016-03-02 20:13:15 -05:00
|
|
|
} else {
|
|
|
|
// if the subinterface parent_iface.vlan_id checks do not pass, return err.
|
|
|
|
// a valid example is 'eth0.10' for a parent iface 'eth0' with a vlan id '10'
|
|
|
|
err := createVlanLink(config.Parent)
|
|
|
|
if err != nil {
|
2019-07-24 20:06:04 -04:00
|
|
|
return false, err
|
2016-03-02 20:13:15 -05:00
|
|
|
}
|
|
|
|
// if driver created the networks slave link, record it for future deletion
|
|
|
|
config.CreatedSlaveLink = true
|
2016-02-16 22:15:18 -05:00
|
|
|
}
|
|
|
|
}
|
2019-07-08 16:52:31 -04:00
|
|
|
if !foundExisting {
|
|
|
|
n := &network{
|
|
|
|
id: config.ID,
|
|
|
|
driver: d,
|
|
|
|
endpoints: endpointTable{},
|
|
|
|
config: config,
|
|
|
|
}
|
|
|
|
// add the network
|
|
|
|
d.addNetwork(n)
|
2016-02-16 22:15:18 -05:00
|
|
|
}
|
|
|
|
|
2019-07-08 16:52:31 -04:00
|
|
|
return foundExisting, nil
|
2016-02-16 22:15:18 -05:00
|
|
|
}
|
|
|
|
|
2016-09-18 05:57:49 -04:00
|
|
|
// DeleteNetwork deletes the network for the specified driver type
|
2016-02-16 22:15:18 -05:00
|
|
|
func (d *driver) DeleteNetwork(nid string) error {
|
2016-03-10 16:23:04 -05:00
|
|
|
defer osl.InitOSContext()()
|
2016-02-16 22:15:18 -05:00
|
|
|
n := d.network(nid)
|
2016-03-02 20:13:15 -05:00
|
|
|
if n == nil {
|
|
|
|
return fmt.Errorf("network id %s not found", nid)
|
|
|
|
}
|
2016-02-16 22:15:18 -05:00
|
|
|
// if the driver created the slave interface, delete it, otherwise leave it
|
|
|
|
if ok := n.config.CreatedSlaveLink; ok {
|
2016-03-02 20:13:15 -05:00
|
|
|
// if the interface exists, only delete if it matches iface.vlan or dummy.net_id naming
|
|
|
|
if ok := parentExists(n.config.Parent); ok {
|
|
|
|
// only delete the link if it is named the net_id
|
|
|
|
if n.config.Parent == getDummyName(stringid.TruncateID(nid)) {
|
|
|
|
err := delDummyLink(n.config.Parent)
|
|
|
|
if err != nil {
|
|
|
|
logrus.Debugf("link %s was not deleted, continuing the delete network operation: %v",
|
|
|
|
n.config.Parent, err)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// only delete the link if it matches iface.vlan naming
|
|
|
|
err := delVlanLink(n.config.Parent)
|
|
|
|
if err != nil {
|
|
|
|
logrus.Debugf("link %s was not deleted, continuing the delete network operation: %v",
|
|
|
|
n.config.Parent, err)
|
|
|
|
}
|
2016-02-16 22:15:18 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2016-10-13 22:15:20 -04:00
|
|
|
for _, ep := range n.endpoints {
|
|
|
|
if link, err := ns.NlHandle().LinkByName(ep.srcName); err == nil {
|
2018-02-28 12:38:35 -05:00
|
|
|
if err := ns.NlHandle().LinkDel(link); err != nil {
|
|
|
|
logrus.WithError(err).Warnf("Failed to delete interface (%s)'s link on endpoint (%s) delete", ep.srcName, ep.id)
|
|
|
|
}
|
2016-10-13 22:15:20 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := d.storeDelete(ep); err != nil {
|
2018-07-05 16:33:01 -04:00
|
|
|
logrus.Warnf("Failed to remove macvlan endpoint %.7s from store: %v", ep.id, err)
|
2016-10-13 22:15:20 -04:00
|
|
|
}
|
|
|
|
}
|
2016-02-16 22:15:18 -05:00
|
|
|
// delete the *network
|
|
|
|
d.deleteNetwork(nid)
|
|
|
|
// delete the network record from persistent cache
|
2016-03-02 20:13:15 -05:00
|
|
|
err := d.storeDelete(n.config)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error deleting deleting id %s from datastore: %v", nid, err)
|
|
|
|
}
|
|
|
|
return nil
|
2016-02-16 22:15:18 -05:00
|
|
|
}
|
|
|
|
|
2016-09-18 05:57:49 -04:00
|
|
|
// parseNetworkOptions parses docker network options
|
2016-02-16 22:15:18 -05:00
|
|
|
func parseNetworkOptions(id string, option options.Generic) (*configuration, error) {
|
|
|
|
var (
|
|
|
|
err error
|
|
|
|
config = &configuration{}
|
|
|
|
)
|
|
|
|
// parse generic labels first
|
|
|
|
if genData, ok := option[netlabel.GenericData]; ok && genData != nil {
|
|
|
|
if config, err = parseNetworkGenericOptions(genData); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
2019-06-27 09:53:57 -04:00
|
|
|
if val, ok := option[netlabel.Internal]; ok {
|
|
|
|
if internal, ok := val.(bool); ok && internal {
|
|
|
|
config.Internal = true
|
|
|
|
}
|
2016-02-16 22:15:18 -05:00
|
|
|
}
|
2016-03-02 20:13:15 -05:00
|
|
|
|
2016-02-16 22:15:18 -05:00
|
|
|
return config, nil
|
|
|
|
}
|
|
|
|
|
2016-09-18 05:57:49 -04:00
|
|
|
// parseNetworkGenericOptions parses generic driver docker network options
|
2016-02-16 22:15:18 -05:00
|
|
|
func parseNetworkGenericOptions(data interface{}) (*configuration, error) {
|
|
|
|
var (
|
|
|
|
err error
|
|
|
|
config *configuration
|
|
|
|
)
|
|
|
|
switch opt := data.(type) {
|
|
|
|
case *configuration:
|
|
|
|
config = opt
|
|
|
|
case map[string]string:
|
|
|
|
config = &configuration{}
|
|
|
|
err = config.fromOptions(opt)
|
|
|
|
case options.Generic:
|
|
|
|
var opaqueConfig interface{}
|
|
|
|
if opaqueConfig, err = options.GenerateFromModel(opt, config); err == nil {
|
|
|
|
config = opaqueConfig.(*configuration)
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
err = types.BadRequestErrorf("unrecognized network configuration format: %v", opt)
|
|
|
|
}
|
2016-03-02 20:13:15 -05:00
|
|
|
|
2016-02-16 22:15:18 -05:00
|
|
|
return config, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// fromOptions binds the generic options to networkConfiguration to cache
|
|
|
|
func (config *configuration) fromOptions(labels map[string]string) error {
|
|
|
|
for label, value := range labels {
|
|
|
|
switch label {
|
2016-03-02 20:13:15 -05:00
|
|
|
case parentOpt:
|
|
|
|
// parse driver option '-o parent'
|
|
|
|
config.Parent = value
|
2016-02-16 22:15:18 -05:00
|
|
|
case driverModeOpt:
|
|
|
|
// parse driver option '-o macvlan_mode'
|
|
|
|
config.MacvlanMode = value
|
|
|
|
}
|
|
|
|
}
|
2016-03-02 20:13:15 -05:00
|
|
|
|
2016-02-16 22:15:18 -05:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// processIPAM parses v4 and v6 IP information and binds it to the network configuration
|
|
|
|
func (config *configuration) processIPAM(id string, ipamV4Data, ipamV6Data []driverapi.IPAMData) error {
|
|
|
|
if len(ipamV4Data) > 0 {
|
|
|
|
for _, ipd := range ipamV4Data {
|
|
|
|
s := &ipv4Subnet{
|
|
|
|
SubnetIP: ipd.Pool.String(),
|
|
|
|
GwIP: ipd.Gateway.String(),
|
|
|
|
}
|
|
|
|
config.Ipv4Subnets = append(config.Ipv4Subnets, s)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if len(ipamV6Data) > 0 {
|
|
|
|
for _, ipd := range ipamV6Data {
|
|
|
|
s := &ipv6Subnet{
|
|
|
|
SubnetIP: ipd.Pool.String(),
|
|
|
|
GwIP: ipd.Gateway.String(),
|
|
|
|
}
|
|
|
|
config.Ipv6Subnets = append(config.Ipv6Subnets, s)
|
|
|
|
}
|
|
|
|
}
|
2016-03-02 20:13:15 -05:00
|
|
|
|
2016-02-16 22:15:18 -05:00
|
|
|
return nil
|
|
|
|
}
|