|
@@ -12,7 +12,13 @@ import (
|
|
"github.com/docker/libnetwork/types"
|
|
"github.com/docker/libnetwork/types"
|
|
)
|
|
)
|
|
|
|
|
|
-const bridgePrefix = "bridge"
|
|
|
|
|
|
+const (
|
|
|
|
+ // network config prefix was not specific enough.
|
|
|
|
+ // To be backward compatible, need custom endpoint
|
|
|
|
+ // prefix with different root
|
|
|
|
+ bridgePrefix = "bridge"
|
|
|
|
+ bridgeEndpointPrefix = "bridge-endpoint"
|
|
|
|
+)
|
|
|
|
|
|
func (d *driver) initStore(option map[string]interface{}) error {
|
|
func (d *driver) initStore(option map[string]interface{}) error {
|
|
if data, ok := option[netlabel.LocalKVClient]; ok {
|
|
if data, ok := option[netlabel.LocalKVClient]; ok {
|
|
@@ -26,7 +32,15 @@ func (d *driver) initStore(option map[string]interface{}) error {
|
|
return types.InternalErrorf("bridge driver failed to initialize data store: %v", err)
|
|
return types.InternalErrorf("bridge driver failed to initialize data store: %v", err)
|
|
}
|
|
}
|
|
|
|
|
|
- return d.populateNetworks()
|
|
|
|
|
|
+ err = d.populateNetworks()
|
|
|
|
+ if err != nil {
|
|
|
|
+ return err
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ err = d.populateEndpoints()
|
|
|
|
+ if err != nil {
|
|
|
|
+ return err
|
|
|
|
+ }
|
|
}
|
|
}
|
|
|
|
|
|
return nil
|
|
return nil
|
|
@@ -48,6 +62,36 @@ func (d *driver) populateNetworks() error {
|
|
if err = d.createNetwork(ncfg); err != nil {
|
|
if err = d.createNetwork(ncfg); err != nil {
|
|
logrus.Warnf("could not create bridge network for id %s bridge name %s while booting up from persistent state: %v", ncfg.ID, ncfg.BridgeName, err)
|
|
logrus.Warnf("could not create bridge network for id %s bridge name %s while booting up from persistent state: %v", ncfg.ID, ncfg.BridgeName, err)
|
|
}
|
|
}
|
|
|
|
+ logrus.Debugf("Network (%s) restored", ncfg.ID[0:7])
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ return nil
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+func (d *driver) populateEndpoints() error {
|
|
|
|
+ kvol, err := d.store.List(datastore.Key(bridgeEndpointPrefix), &bridgeEndpoint{})
|
|
|
|
+ if err != nil && err != datastore.ErrKeyNotFound {
|
|
|
|
+ return fmt.Errorf("failed to get bridge endpoints from store: %v", err)
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ if err == datastore.ErrKeyNotFound {
|
|
|
|
+ return nil
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ for _, kvo := range kvol {
|
|
|
|
+ ep := kvo.(*bridgeEndpoint)
|
|
|
|
+ n, ok := d.networks[ep.nid]
|
|
|
|
+ if !ok {
|
|
|
|
+ logrus.Debugf("Network (%s) not found for restored bridge endpoint (%s)", ep.nid[0:7], ep.id[0:7])
|
|
|
|
+ logrus.Debugf("Deleting stale bridge endpoint (%s) from store", ep.nid[0:7])
|
|
|
|
+ if err := d.storeDelete(ep); err != nil {
|
|
|
|
+ logrus.Debugf("Failed to delete stale bridge endpoint (%s) from store", ep.nid[0:7])
|
|
|
|
+ }
|
|
|
|
+ continue
|
|
|
|
+ }
|
|
|
|
+ n.endpoints[ep.id] = ep
|
|
|
|
+ n.restorePortAllocations(ep)
|
|
|
|
+ logrus.Debugf("Endpoint (%s) restored to network (%s)", ep.id[0:7], ep.nid[0:7])
|
|
}
|
|
}
|
|
|
|
|
|
return nil
|
|
return nil
|
|
@@ -184,7 +228,7 @@ func (ncfg *networkConfiguration) Exists() bool {
|
|
}
|
|
}
|
|
|
|
|
|
func (ncfg *networkConfiguration) Skip() bool {
|
|
func (ncfg *networkConfiguration) Skip() bool {
|
|
- return ncfg.DefaultBridge
|
|
|
|
|
|
+ return false
|
|
}
|
|
}
|
|
|
|
|
|
func (ncfg *networkConfiguration) New() datastore.KVObject {
|
|
func (ncfg *networkConfiguration) New() datastore.KVObject {
|
|
@@ -200,3 +244,135 @@ func (ncfg *networkConfiguration) CopyTo(o datastore.KVObject) error {
|
|
func (ncfg *networkConfiguration) DataScope() string {
|
|
func (ncfg *networkConfiguration) DataScope() string {
|
|
return datastore.LocalScope
|
|
return datastore.LocalScope
|
|
}
|
|
}
|
|
|
|
+
|
|
|
|
+func (ep *bridgeEndpoint) MarshalJSON() ([]byte, error) {
|
|
|
|
+ epMap := make(map[string]interface{})
|
|
|
|
+ epMap["id"] = ep.id
|
|
|
|
+ epMap["nid"] = ep.nid
|
|
|
|
+ epMap["SrcName"] = ep.srcName
|
|
|
|
+ epMap["MacAddress"] = ep.macAddress.String()
|
|
|
|
+ epMap["Addr"] = ep.addr.String()
|
|
|
|
+ if ep.addrv6 != nil {
|
|
|
|
+ epMap["Addrv6"] = ep.addrv6.String()
|
|
|
|
+ }
|
|
|
|
+ epMap["Config"] = ep.config
|
|
|
|
+ epMap["ContainerConfig"] = ep.containerConfig
|
|
|
|
+ epMap["ExternalConnConfig"] = ep.extConnConfig
|
|
|
|
+ epMap["PortMapping"] = ep.portMapping
|
|
|
|
+
|
|
|
|
+ return json.Marshal(epMap)
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+func (ep *bridgeEndpoint) UnmarshalJSON(b []byte) error {
|
|
|
|
+ var (
|
|
|
|
+ err error
|
|
|
|
+ epMap map[string]interface{}
|
|
|
|
+ )
|
|
|
|
+
|
|
|
|
+ if err = json.Unmarshal(b, &epMap); err != nil {
|
|
|
|
+ return fmt.Errorf("Failed to unmarshal to bridge endpoint: %v", err)
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ if v, ok := epMap["MacAddress"]; ok {
|
|
|
|
+ if ep.macAddress, err = net.ParseMAC(v.(string)); err != nil {
|
|
|
|
+ return types.InternalErrorf("failed to decode bridge endpoint MAC address (%s) after json unmarshal: %v", v.(string), err)
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ if v, ok := epMap["Addr"]; ok {
|
|
|
|
+ if ep.addr, err = types.ParseCIDR(v.(string)); err != nil {
|
|
|
|
+ return types.InternalErrorf("failed to decode bridge endpoint IPv4 address (%s) after json unmarshal: %v", v.(string), err)
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ if v, ok := epMap["Addrv6"]; ok {
|
|
|
|
+ if ep.addrv6, err = types.ParseCIDR(v.(string)); err != nil {
|
|
|
|
+ return types.InternalErrorf("failed to decode bridge endpoint IPv6 address (%s) after json unmarshal: %v", v.(string), err)
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ ep.id = epMap["id"].(string)
|
|
|
|
+ ep.nid = epMap["nid"].(string)
|
|
|
|
+ ep.srcName = epMap["SrcName"].(string)
|
|
|
|
+ d, _ := json.Marshal(epMap["Config"])
|
|
|
|
+ if err := json.Unmarshal(d, &ep.config); err != nil {
|
|
|
|
+ logrus.Warnf("Failed to decode endpoint config %v", err)
|
|
|
|
+ }
|
|
|
|
+ d, _ = json.Marshal(epMap["ContainerConfig"])
|
|
|
|
+ if err := json.Unmarshal(d, &ep.containerConfig); err != nil {
|
|
|
|
+ logrus.Warnf("Failed to decode endpoint container config %v", err)
|
|
|
|
+ }
|
|
|
|
+ d, _ = json.Marshal(epMap["ExternalConnConfig"])
|
|
|
|
+ if err := json.Unmarshal(d, &ep.extConnConfig); err != nil {
|
|
|
|
+ logrus.Warnf("Failed to decode endpoint external connectivity configuration %v", err)
|
|
|
|
+ }
|
|
|
|
+ d, _ = json.Marshal(epMap["PortMapping"])
|
|
|
|
+ if err := json.Unmarshal(d, &ep.portMapping); err != nil {
|
|
|
|
+ logrus.Warnf("Failed to decode endpoint port mapping %v", err)
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ return nil
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+func (ep *bridgeEndpoint) Key() []string {
|
|
|
|
+ return []string{bridgeEndpointPrefix, ep.id}
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+func (ep *bridgeEndpoint) KeyPrefix() []string {
|
|
|
|
+ return []string{bridgeEndpointPrefix}
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+func (ep *bridgeEndpoint) Value() []byte {
|
|
|
|
+ b, err := json.Marshal(ep)
|
|
|
|
+ if err != nil {
|
|
|
|
+ return nil
|
|
|
|
+ }
|
|
|
|
+ return b
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+func (ep *bridgeEndpoint) SetValue(value []byte) error {
|
|
|
|
+ return json.Unmarshal(value, ep)
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+func (ep *bridgeEndpoint) Index() uint64 {
|
|
|
|
+ return ep.dbIndex
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+func (ep *bridgeEndpoint) SetIndex(index uint64) {
|
|
|
|
+ ep.dbIndex = index
|
|
|
|
+ ep.dbExists = true
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+func (ep *bridgeEndpoint) Exists() bool {
|
|
|
|
+ return ep.dbExists
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+func (ep *bridgeEndpoint) Skip() bool {
|
|
|
|
+ return false
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+func (ep *bridgeEndpoint) New() datastore.KVObject {
|
|
|
|
+ return &bridgeEndpoint{}
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+func (ep *bridgeEndpoint) CopyTo(o datastore.KVObject) error {
|
|
|
|
+ dstEp := o.(*bridgeEndpoint)
|
|
|
|
+ *dstEp = *ep
|
|
|
|
+ return nil
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+func (ep *bridgeEndpoint) DataScope() string {
|
|
|
|
+ return datastore.LocalScope
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+func (n *bridgeNetwork) restorePortAllocations(ep *bridgeEndpoint) {
|
|
|
|
+ if ep.extConnConfig == nil ||
|
|
|
|
+ ep.extConnConfig.ExposedPorts == nil ||
|
|
|
|
+ ep.extConnConfig.PortBindings == nil {
|
|
|
|
+ return
|
|
|
|
+ }
|
|
|
|
+ tmp := ep.extConnConfig.PortBindings
|
|
|
|
+ ep.extConnConfig.PortBindings = ep.portMapping
|
|
|
|
+ _, err := n.allocatePorts(ep, n.config.DefaultBindingIP, n.driver.config.EnableUserlandProxy)
|
|
|
|
+ if err != nil {
|
|
|
|
+ logrus.Warnf("Failed to reserve existing port mapping for endpoint %s:%v", ep.id[0:7], err)
|
|
|
|
+ }
|
|
|
|
+ ep.extConnConfig.PortBindings = tmp
|
|
|
|
+}
|