Merge pull request #46843 from akerouanton/fix/bad-mac-address
daemon: build ports-related ep options in a dedicated func
This commit is contained in:
commit
35eba19a65
1 changed files with 35 additions and 11 deletions
|
@ -862,11 +862,43 @@ func buildCreateEndpointOptions(c *container.Container, n *libnetwork.Network, e
|
|||
createOptions = append(createOptions, libnetwork.CreateOptionDisableResolution())
|
||||
}
|
||||
|
||||
opts, err := buildPortsRelatedCreateEndpointOptions(c, n, sb)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
createOptions = append(createOptions, opts...)
|
||||
|
||||
// On Windows, DNS config is a per-adapter config option whereas on Linux, it's a sandbox-wide parameter; hence why
|
||||
// we're dealing with DNS config both here and in buildSandboxOptions. Following DNS options are only honored by
|
||||
// Windows netdrivers, whereas DNS options in buildSandboxOptions are only honored by Linux netdrivers.
|
||||
//
|
||||
// Now that being said, you might ask: why is this cond checking whether there's already an endpoint with exposed /
|
||||
// published ports tied to the container sandbox? Isn't that logic flawed? Well, probably it is! These DNS options
|
||||
// were added by d1e0a78 at the end of buildCreateEndpointOptions. The fact that it was added *after* an
|
||||
// early-return checking exposed / published ports was most probably overlooked by the original author and
|
||||
// reviewers.
|
||||
// TODO(aker): fix this ^
|
||||
if !n.Internal() && len(getPortMapInfo(sb)) == 0 {
|
||||
if len(c.HostConfig.DNS) > 0 {
|
||||
createOptions = append(createOptions, libnetwork.CreateOptionDNS(c.HostConfig.DNS))
|
||||
} else if len(daemonDNS) > 0 {
|
||||
createOptions = append(createOptions, libnetwork.CreateOptionDNS(daemonDNS))
|
||||
}
|
||||
}
|
||||
|
||||
createOptions = append(createOptions, libnetwork.EndpointOptionGeneric(genericOptions))
|
||||
|
||||
return createOptions, nil
|
||||
}
|
||||
|
||||
// buildPortsRelatedCreateEndpointOptions returns the appropriate endpoint options to apply config related to port
|
||||
// mapping and exposed ports.
|
||||
func buildPortsRelatedCreateEndpointOptions(c *container.Container, n *libnetwork.Network, sb *libnetwork.Sandbox) ([]libnetwork.EndpointOption, error) {
|
||||
// Port-mapping rules belong to the container & applicable only to non-internal networks.
|
||||
//
|
||||
// TODO(thaJeztah): Look if we can provide a more minimal function for getPortMapInfo, as it does a lot, and we only need the "length".
|
||||
if n.Internal() || len(getPortMapInfo(sb)) > 0 {
|
||||
return createOptions, nil
|
||||
return nil, nil
|
||||
}
|
||||
|
||||
bindings := make(nat.PortMap)
|
||||
|
@ -927,18 +959,10 @@ func buildCreateEndpointOptions(c *container.Container, n *libnetwork.Network, e
|
|||
}
|
||||
}
|
||||
|
||||
if len(c.HostConfig.DNS) > 0 {
|
||||
createOptions = append(createOptions, libnetwork.CreateOptionDNS(c.HostConfig.DNS))
|
||||
} else if len(daemonDNS) > 0 {
|
||||
createOptions = append(createOptions, libnetwork.CreateOptionDNS(daemonDNS))
|
||||
}
|
||||
|
||||
createOptions = append(createOptions,
|
||||
return []libnetwork.EndpointOption{
|
||||
libnetwork.CreateOptionPortMapping(publishedPorts),
|
||||
libnetwork.CreateOptionExposedPorts(exposedPorts),
|
||||
libnetwork.EndpointOptionGeneric(genericOptions))
|
||||
|
||||
return createOptions, nil
|
||||
}, nil
|
||||
}
|
||||
|
||||
// getPortMapInfo retrieves the current port-mapping programmed for the given sandbox
|
||||
|
|
Loading…
Add table
Reference in a new issue