diff --git a/hack/dockerfile/install/proxy.installer b/hack/dockerfile/install/proxy.installer index 887a0db13d..30d1d509b6 100755 --- a/hack/dockerfile/install/proxy.installer +++ b/hack/dockerfile/install/proxy.installer @@ -3,7 +3,7 @@ # LIBNETWORK_COMMIT is used to build the docker-userland-proxy binary. When # updating the binary version, consider updating github.com/docker/libnetwork # in vendor.conf accordingly -: "${LIBNETWORK_COMMIT:=90afbb01e1d8acacb505a092744ea42b9f167377}" +: "${LIBNETWORK_COMMIT:=feeff4f0a3fd2a2bb19cf67c826082c66ffaaed9}" install_proxy() { case "$1" in diff --git a/vendor.conf b/vendor.conf index 1f4e40466a..36100a57b9 100644 --- a/vendor.conf +++ b/vendor.conf @@ -38,7 +38,7 @@ github.com/gofrs/flock 392e7fae8f1b0bdbd67dad7237d2 # libnetwork # When updating, also update LIBNETWORK_COMMIT in hack/dockerfile/install/proxy.installer accordingly -github.com/docker/libnetwork 90afbb01e1d8acacb505a092744ea42b9f167377 +github.com/docker/libnetwork feeff4f0a3fd2a2bb19cf67c826082c66ffaaed9 github.com/docker/go-events 9461782956ad83b30282bf90e31fa6a70c255ba9 github.com/armon/go-radix e39d623f12e8e41c7b5529e9a9dd67a1e2261f80 github.com/armon/go-metrics eb0af217e5e9747e41dd5303755356b62d28e3ec diff --git a/vendor/github.com/docker/libnetwork/agent.go b/vendor/github.com/docker/libnetwork/agent.go index f7d57e23a2..fa6ec525b6 100644 --- a/vendor/github.com/docker/libnetwork/agent.go +++ b/vendor/github.com/docker/libnetwork/agent.go @@ -184,6 +184,16 @@ func (c *controller) handleKeyChange(keys []*types.EncryptionKey) error { err := driver.DiscoverNew(discoverapi.EncryptionKeysUpdate, drvEnc) if err != nil { logrus.Warnf("Failed to update datapath keys in driver %s: %v", name, err) + // Attempt to reconfigure keys in case of a update failure + // which can arise due to a mismatch of keys + // if worker nodes get temporarily disconnected + logrus.Warnf("Reconfiguring datapath keys for %s", name) + drvCfgEnc := discoverapi.DriverEncryptionConfig{} + drvCfgEnc.Keys, drvCfgEnc.Tags = c.getKeys(subsysIPSec) + err = driver.DiscoverNew(discoverapi.EncryptionKeysConfig, drvCfgEnc) + if err != nil { + logrus.Warnf("Failed to reset datapath keys in driver %s: %v", name, err) + } } return false }) diff --git a/vendor/github.com/docker/libnetwork/config/config.go b/vendor/github.com/docker/libnetwork/config/config.go index b7c66e9884..6af5a01953 100644 --- a/vendor/github.com/docker/libnetwork/config/config.go +++ b/vendor/github.com/docker/libnetwork/config/config.go @@ -1,6 +1,7 @@ package config import ( + "fmt" "strings" "github.com/BurntSushi/toml" @@ -13,6 +14,7 @@ import ( "github.com/docker/libnetwork/ipamutils" "github.com/docker/libnetwork/netlabel" "github.com/docker/libnetwork/osl" + "github.com/docker/libnetwork/portallocator" "github.com/sirupsen/logrus" ) @@ -238,6 +240,23 @@ func OptionExperimental(exp bool) Option { } } +// OptionDynamicPortRange function returns an option setter for service port allocation range +func OptionDynamicPortRange(in string) Option { + return func(c *Config) { + start, end := 0, 0 + if len(in) > 0 { + n, err := fmt.Sscanf(in, "%d-%d", &start, &end) + if n != 2 || err != nil { + logrus.Errorf("Failed to parse range string with err %v", err) + return + } + } + if err := portallocator.Get().SetPortRange(start, end); err != nil { + logrus.Errorf("Failed to set port range with err %v", err) + } + } +} + // OptionNetworkControlPlaneMTU function returns an option setter for control plane MTU func OptionNetworkControlPlaneMTU(exp int) Option { return func(c *Config) { diff --git a/vendor/github.com/docker/libnetwork/drivers/bridge/setup_device.go b/vendor/github.com/docker/libnetwork/drivers/bridge/setup_device.go index a9dfd06771..548ad951df 100644 --- a/vendor/github.com/docker/libnetwork/drivers/bridge/setup_device.go +++ b/vendor/github.com/docker/libnetwork/drivers/bridge/setup_device.go @@ -35,18 +35,17 @@ func setupDevice(config *networkConfiguration, i *bridgeInterface) error { setMac = kv.Kernel > 3 || (kv.Kernel == 3 && kv.Major >= 3) } + if setMac { + hwAddr := netutils.GenerateRandomMAC() + i.Link.Attrs().HardwareAddr = hwAddr + logrus.Debugf("Setting bridge mac address to %s", hwAddr) + } + if err = i.nlh.LinkAdd(i.Link); err != nil { logrus.Debugf("Failed to create bridge %s via netlink. Trying ioctl", config.BridgeName) return ioctlCreateBridge(config.BridgeName, setMac) } - if setMac { - hwAddr := netutils.GenerateRandomMAC() - if err = i.nlh.LinkSetHardwareAddr(i.Link, hwAddr); err != nil { - return fmt.Errorf("failed to set bridge mac-address %s : %s", hwAddr, err.Error()) - } - logrus.Debugf("Setting bridge mac address to %s", hwAddr) - } return err } diff --git a/vendor/github.com/docker/libnetwork/drivers/overlay/overlay.go b/vendor/github.com/docker/libnetwork/drivers/overlay/overlay.go index 1ec1e0070b..6f83e6de06 100644 --- a/vendor/github.com/docker/libnetwork/drivers/overlay/overlay.go +++ b/vendor/github.com/docker/libnetwork/drivers/overlay/overlay.go @@ -378,7 +378,7 @@ func (d *driver) DiscoverNew(dType discoverapi.DiscoveryType, data interface{}) } } if err := d.updateKeys(newKey, priKey, delKey); err != nil { - logrus.Warn(err) + return err } default: } diff --git a/vendor/github.com/docker/libnetwork/endpoint.go b/vendor/github.com/docker/libnetwork/endpoint.go index 822f88bd3e..8debc99ece 100644 --- a/vendor/github.com/docker/libnetwork/endpoint.go +++ b/vendor/github.com/docker/libnetwork/endpoint.go @@ -498,11 +498,14 @@ func (ep *endpoint) sbJoin(sb *sandbox, options ...EndpointOption) (err error) { } if doUpdateHostsFile(n, sb) { - address := "" - if ip := ep.getFirstInterfaceAddress(); ip != nil { - address = ip.String() + var addresses []string + if ip := ep.getFirstInterfaceIPv4Address(); ip != nil { + addresses = append(addresses, ip.String()) } - if err = sb.updateHostsFile(address); err != nil { + if ip := ep.getFirstInterfaceIPv6Address(); ip != nil { + addresses = append(addresses, ip.String()) + } + if err = sb.updateHostsFile(addresses); err != nil { return err } } @@ -912,7 +915,7 @@ func (ep *endpoint) getSandbox() (*sandbox, bool) { return ps, ok } -func (ep *endpoint) getFirstInterfaceAddress() net.IP { +func (ep *endpoint) getFirstInterfaceIPv4Address() net.IP { ep.Lock() defer ep.Unlock() @@ -923,6 +926,17 @@ func (ep *endpoint) getFirstInterfaceAddress() net.IP { return nil } +func (ep *endpoint) getFirstInterfaceIPv6Address() net.IP { + ep.Lock() + defer ep.Unlock() + + if ep.iface.addrv6 != nil { + return ep.iface.addrv6.IP + } + + return nil +} + // EndpointOptionGeneric function returns an option setter for a Generic option defined // in a Dictionary of Key-Value pair func EndpointOptionGeneric(generic map[string]interface{}) EndpointOption { diff --git a/vendor/github.com/docker/libnetwork/portallocator/portallocator.go b/vendor/github.com/docker/libnetwork/portallocator/portallocator.go index 9798d23eb1..c87478c0cd 100644 --- a/vendor/github.com/docker/libnetwork/portallocator/portallocator.go +++ b/vendor/github.com/docker/libnetwork/portallocator/portallocator.go @@ -3,17 +3,36 @@ package portallocator import ( "errors" "fmt" + "github.com/sirupsen/logrus" "net" "sync" ) -const ( - // DefaultPortRangeStart indicates the first port in port range - DefaultPortRangeStart = 49153 - // DefaultPortRangeEnd indicates the last port in port range - DefaultPortRangeEnd = 65535 +var ( + // defaultPortRangeStart indicates the first port in port range + defaultPortRangeStart = 49153 + // defaultPortRangeEnd indicates the last port in port range + // consistent with default /proc/sys/net/ipv4/ip_local_port_range + // upper bound on linux + defaultPortRangeEnd = 60999 ) +func sanitizePortRange(start int, end int) (newStart, newEnd int, err error) { + if start > defaultPortRangeEnd || end < defaultPortRangeStart || start > end { + return 0, 0, fmt.Errorf("Request out allowed range [%v, %v]", + defaultPortRangeStart, defaultPortRangeEnd) + } + err = nil + newStart, newEnd = start, end + if start < defaultPortRangeStart { + newStart = defaultPortRangeStart + } + if end > defaultPortRangeEnd { + newEnd = defaultPortRangeEnd + } + return +} + type ipMapping map[string]protoMap var ( @@ -92,11 +111,19 @@ func Get() *PortAllocator { return instance } -func newInstance() *PortAllocator { +func getDefaultPortRange() (int, int) { start, end, err := getDynamicPortRange() - if err != nil { - start, end = DefaultPortRangeStart, DefaultPortRangeEnd + if err == nil { + start, end, err = sanitizePortRange(start, end) } + if err != nil { + start, end = defaultPortRangeStart, defaultPortRangeEnd + } + return start, end +} + +func newInstance() *PortAllocator { + start, end := getDefaultPortRange() return &PortAllocator{ ipMap: ipMapping{}, Begin: start, @@ -170,6 +197,35 @@ func (p *PortAllocator) ReleasePort(ip net.IP, proto string, port int) error { return nil } +// SetPortRange sets dynamic port allocation range. +// if both portBegin and portEnd are 0, the port range reverts to default +// value. Otherwise they are sanitized against the default values to +// ensure their validity. +func (p *PortAllocator) SetPortRange(portBegin, portEnd int) error { + // if begin and end is zero, revert to default values + var begin, end int + var err error + if portBegin == 0 && portEnd == 0 { + begin, end = getDefaultPortRange() + + } else { + begin, end, err = sanitizePortRange(portBegin, portEnd) + if err != nil { + return err + } + } + logrus.Debugf("Setting up port allocator to range %v-%v, current %v-%v", + begin, end, p.Begin, p.End) + p.mutex.Lock() + defer p.mutex.Unlock() + if p.Begin == begin && p.End == end { + return nil + } + p.ipMap = ipMapping{} + p.Begin, p.End = begin, end + return nil +} + func (p *PortAllocator) newPortMap() *portMap { defaultKey := getRangeKey(p.Begin, p.End) pm := &portMap{ diff --git a/vendor/github.com/docker/libnetwork/portallocator/portallocator_freebsd.go b/vendor/github.com/docker/libnetwork/portallocator/portallocator_freebsd.go index 97d7fbb49d..d71038ed54 100644 --- a/vendor/github.com/docker/libnetwork/portallocator/portallocator_freebsd.go +++ b/vendor/github.com/docker/libnetwork/portallocator/portallocator_freebsd.go @@ -8,7 +8,7 @@ import ( func getDynamicPortRange() (start int, end int, err error) { portRangeKernelSysctl := []string{"net.inet.ip.portrange.hifirst", "net.ip.portrange.hilast"} - portRangeFallback := fmt.Sprintf("using fallback port range %d-%d", DefaultPortRangeStart, DefaultPortRangeEnd) + portRangeFallback := fmt.Sprintf("using fallback port range %d-%d", defaultPortRangeStart, defaultPortRangeEnd) portRangeLowCmd := exec.Command("/sbin/sysctl", portRangeKernelSysctl[0]) var portRangeLowOut bytes.Buffer portRangeLowCmd.Stdout = &portRangeLowOut diff --git a/vendor/github.com/docker/libnetwork/portallocator/portallocator_linux.go b/vendor/github.com/docker/libnetwork/portallocator/portallocator_linux.go index 687f6dabb7..8ce696273e 100644 --- a/vendor/github.com/docker/libnetwork/portallocator/portallocator_linux.go +++ b/vendor/github.com/docker/libnetwork/portallocator/portallocator_linux.go @@ -8,7 +8,7 @@ import ( func getDynamicPortRange() (start int, end int, err error) { const portRangeKernelParam = "/proc/sys/net/ipv4/ip_local_port_range" - portRangeFallback := fmt.Sprintf("using fallback port range %d-%d", DefaultPortRangeStart, DefaultPortRangeEnd) + portRangeFallback := fmt.Sprintf("using fallback port range %d-%d", defaultPortRangeStart, defaultPortRangeEnd) file, err := os.Open(portRangeKernelParam) if err != nil { return 0, 0, fmt.Errorf("port allocator - %s due to error: %v", portRangeFallback, err) diff --git a/vendor/github.com/docker/libnetwork/portallocator/portallocator_windows.go b/vendor/github.com/docker/libnetwork/portallocator/portallocator_windows.go index 98cae14f68..7d0d5c8037 100644 --- a/vendor/github.com/docker/libnetwork/portallocator/portallocator_windows.go +++ b/vendor/github.com/docker/libnetwork/portallocator/portallocator_windows.go @@ -1,10 +1,10 @@ package portallocator -const ( - StartPortRange = 60000 - EndPortRange = 65000 -) +func init() { + defaultPortRangeStart = 60000 + defaultPortRangeEnd = 65000 +} func getDynamicPortRange() (start int, end int, err error) { - return StartPortRange, EndPortRange, nil + return defaultPortRangeStart, defaultPortRangeEnd, nil } diff --git a/vendor/github.com/docker/libnetwork/sandbox_dns_unix.go b/vendor/github.com/docker/libnetwork/sandbox_dns_unix.go index f43b5d6035..08bf017326 100644 --- a/vendor/github.com/docker/libnetwork/sandbox_dns_unix.go +++ b/vendor/github.com/docker/libnetwork/sandbox_dns_unix.go @@ -98,8 +98,8 @@ func (sb *sandbox) buildHostsFile() error { return etchosts.Build(sb.config.hostsPath, "", sb.config.hostName, sb.config.domainName, extraContent) } -func (sb *sandbox) updateHostsFile(ifaceIP string) error { - if ifaceIP == "" { +func (sb *sandbox) updateHostsFile(ifaceIPs []string) error { + if ifaceIPs == nil || len(ifaceIPs) == 0 { return nil } @@ -120,7 +120,10 @@ func (sb *sandbox) updateHostsFile(ifaceIP string) error { mhost = fmt.Sprintf("%s %s", fqdn, parts[0]) } - extraContent := []etchosts.Record{{Hosts: mhost, IP: ifaceIP}} + var extraContent []etchosts.Record + for _, ip := range ifaceIPs { + extraContent = append(extraContent, etchosts.Record{Hosts: mhost, IP: ip}) + } sb.addHostsEntries(extraContent) return nil diff --git a/vendor/github.com/docker/libnetwork/sandbox_dns_windows.go b/vendor/github.com/docker/libnetwork/sandbox_dns_windows.go index e1ca73edef..d30bc7eabc 100644 --- a/vendor/github.com/docker/libnetwork/sandbox_dns_windows.go +++ b/vendor/github.com/docker/libnetwork/sandbox_dns_windows.go @@ -18,7 +18,7 @@ func (sb *sandbox) setupResolutionFiles() error { func (sb *sandbox) restorePath() { } -func (sb *sandbox) updateHostsFile(ifaceIP string) error { +func (sb *sandbox) updateHostsFile(ifaceIP []string) error { return nil }