ov_network.go 6.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337
  1. package overlay
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "net"
  6. "sync"
  7. "syscall"
  8. "github.com/Sirupsen/logrus"
  9. "github.com/docker/libnetwork/datastore"
  10. "github.com/docker/libnetwork/ipallocator"
  11. "github.com/docker/libnetwork/sandbox"
  12. "github.com/docker/libnetwork/types"
  13. "github.com/vishvananda/netlink"
  14. "github.com/vishvananda/netlink/nl"
  15. )
  16. type networkTable map[types.UUID]*network
  17. type network struct {
  18. id types.UUID
  19. vni uint32
  20. dbIndex uint64
  21. dbExists bool
  22. sbox sandbox.Sandbox
  23. endpoints endpointTable
  24. ipAllocator *ipallocator.IPAllocator
  25. gw net.IP
  26. vxlanName string
  27. driver *driver
  28. joinCnt int
  29. sync.Mutex
  30. }
  31. func (d *driver) CreateNetwork(id types.UUID, option map[string]interface{}) error {
  32. if id == "" {
  33. return fmt.Errorf("invalid network id")
  34. }
  35. n := &network{
  36. id: id,
  37. driver: d,
  38. endpoints: endpointTable{},
  39. }
  40. n.gw = bridgeIP.IP
  41. d.addNetwork(n)
  42. if err := n.obtainVxlanID(); err != nil {
  43. return err
  44. }
  45. return nil
  46. }
  47. func (d *driver) DeleteNetwork(nid types.UUID) error {
  48. if nid == "" {
  49. return fmt.Errorf("invalid network id")
  50. }
  51. n := d.network(nid)
  52. if n == nil {
  53. return fmt.Errorf("could not find network with id %s", nid)
  54. }
  55. d.deleteNetwork(nid)
  56. return n.releaseVxlanID()
  57. }
  58. func (n *network) joinSandbox() error {
  59. n.Lock()
  60. if n.joinCnt != 0 {
  61. n.joinCnt++
  62. n.Unlock()
  63. return nil
  64. }
  65. n.joinCnt++
  66. n.Unlock()
  67. return n.initSandbox()
  68. }
  69. func (n *network) leaveSandbox() {
  70. n.Lock()
  71. n.joinCnt--
  72. if n.joinCnt != 0 {
  73. n.Unlock()
  74. return
  75. }
  76. n.Unlock()
  77. n.destroySandbox()
  78. }
  79. func (n *network) destroySandbox() {
  80. sbox := n.sandbox()
  81. if sbox != nil {
  82. for _, iface := range sbox.Info().Interfaces() {
  83. iface.Remove()
  84. }
  85. if err := deleteVxlan(n.vxlanName); err != nil {
  86. logrus.Warnf("could not cleanup sandbox properly: %v", err)
  87. }
  88. sbox.Destroy()
  89. }
  90. }
  91. func (n *network) initSandbox() error {
  92. sbox, err := sandbox.NewSandbox(sandbox.GenerateKey(string(n.id)), true)
  93. if err != nil {
  94. return fmt.Errorf("could not create network sandbox: %v", err)
  95. }
  96. // Add a bridge inside the namespace
  97. if err := sbox.AddInterface("bridge1", "br",
  98. sbox.InterfaceOptions().Address(bridgeIP),
  99. sbox.InterfaceOptions().Bridge(true)); err != nil {
  100. return fmt.Errorf("could not create bridge inside the network sandbox: %v", err)
  101. }
  102. vxlanName, err := createVxlan(n.vxlanID())
  103. if err != nil {
  104. return err
  105. }
  106. if err := sbox.AddInterface(vxlanName, "vxlan",
  107. sbox.InterfaceOptions().Master("bridge1")); err != nil {
  108. return fmt.Errorf("could not add vxlan interface inside the network sandbox: %v",
  109. err)
  110. }
  111. n.vxlanName = vxlanName
  112. n.setSandbox(sbox)
  113. n.driver.peerDbUpdateSandbox(n.id)
  114. var nlSock *nl.NetlinkSocket
  115. sbox.InvokeFunc(func() {
  116. nlSock, err = nl.Subscribe(syscall.NETLINK_ROUTE, syscall.RTNLGRP_NEIGH)
  117. if err != nil {
  118. err = fmt.Errorf("failed to subscribe to neighbor group netlink messages")
  119. }
  120. })
  121. go n.watchMiss(nlSock)
  122. return nil
  123. }
  124. func (n *network) watchMiss(nlSock *nl.NetlinkSocket) {
  125. for {
  126. msgs, err := nlSock.Recieve()
  127. if err != nil {
  128. logrus.Errorf("Failed to receive from netlink: %v ", err)
  129. continue
  130. }
  131. for _, msg := range msgs {
  132. if msg.Header.Type != syscall.RTM_GETNEIGH && msg.Header.Type != syscall.RTM_NEWNEIGH {
  133. continue
  134. }
  135. neigh, err := netlink.NeighDeserialize(msg.Data)
  136. if err != nil {
  137. logrus.Errorf("Failed to deserialize netlink ndmsg: %v", err)
  138. continue
  139. }
  140. if neigh.IP.To16() != nil {
  141. continue
  142. }
  143. if neigh.State&(netlink.NUD_STALE|netlink.NUD_INCOMPLETE) == 0 {
  144. continue
  145. }
  146. mac, vtep, err := n.driver.resolvePeer(n.id, neigh.IP)
  147. if err != nil {
  148. logrus.Errorf("could not resolve peer %q: %v", neigh.IP, err)
  149. continue
  150. }
  151. if err := n.driver.peerAdd(n.id, types.UUID("dummy"), neigh.IP, mac, vtep, true); err != nil {
  152. logrus.Errorf("could not add neighbor entry for missed peer: %v", err)
  153. }
  154. }
  155. }
  156. }
  157. func (d *driver) addNetwork(n *network) {
  158. d.Lock()
  159. d.networks[n.id] = n
  160. d.Unlock()
  161. }
  162. func (d *driver) deleteNetwork(nid types.UUID) {
  163. d.Lock()
  164. delete(d.networks, nid)
  165. d.Unlock()
  166. }
  167. func (d *driver) network(nid types.UUID) *network {
  168. d.Lock()
  169. defer d.Unlock()
  170. return d.networks[nid]
  171. }
  172. func (n *network) sandbox() sandbox.Sandbox {
  173. n.Lock()
  174. defer n.Unlock()
  175. return n.sbox
  176. }
  177. func (n *network) setSandbox(sbox sandbox.Sandbox) {
  178. n.Lock()
  179. n.sbox = sbox
  180. n.Unlock()
  181. }
  182. func (n *network) vxlanID() uint32 {
  183. n.Lock()
  184. defer n.Unlock()
  185. return n.vni
  186. }
  187. func (n *network) setVxlanID(vni uint32) {
  188. n.Lock()
  189. n.vni = vni
  190. n.Unlock()
  191. }
  192. func (n *network) Key() []string {
  193. return []string{"overlay", "network", string(n.id)}
  194. }
  195. func (n *network) KeyPrefix() []string {
  196. return []string{"overlay", "network"}
  197. }
  198. func (n *network) Value() []byte {
  199. b, err := json.Marshal(n.vxlanID())
  200. if err != nil {
  201. return []byte{}
  202. }
  203. return b
  204. }
  205. func (n *network) Index() uint64 {
  206. return n.dbIndex
  207. }
  208. func (n *network) SetIndex(index uint64) {
  209. n.dbIndex = index
  210. n.dbExists = true
  211. }
  212. func (n *network) Exists() bool {
  213. return n.dbExists
  214. }
  215. func (n *network) SetValue(value []byte) error {
  216. var vni uint32
  217. err := json.Unmarshal(value, &vni)
  218. if err == nil {
  219. n.setVxlanID(vni)
  220. }
  221. return err
  222. }
  223. func (n *network) writeToStore() error {
  224. return n.driver.store.PutObjectAtomic(n)
  225. }
  226. func (n *network) releaseVxlanID() error {
  227. if n.driver.store == nil {
  228. return fmt.Errorf("no datastore configured. cannot release vxlan id")
  229. }
  230. if n.vxlanID() == 0 {
  231. return nil
  232. }
  233. if err := n.driver.store.DeleteObjectAtomic(n); err != nil {
  234. if err == datastore.ErrKeyModified || err == datastore.ErrKeyNotFound {
  235. // In both the above cases we can safely assume that the key has been removed by some other
  236. // instance and so simply get out of here
  237. return nil
  238. }
  239. return fmt.Errorf("failed to delete network to vxlan id map: %v", err)
  240. }
  241. n.driver.vxlanIdm.Release(n.vxlanID())
  242. n.setVxlanID(0)
  243. return nil
  244. }
  245. func (n *network) obtainVxlanID() error {
  246. if n.driver.store == nil {
  247. return fmt.Errorf("no datastore configured. cannot obtain vxlan id")
  248. }
  249. for {
  250. var vxlanID uint32
  251. if err := n.driver.store.GetObject(datastore.Key(n.Key()...), n); err != nil {
  252. if err == datastore.ErrKeyNotFound {
  253. vxlanID, err = n.driver.vxlanIdm.GetID()
  254. if err != nil {
  255. return fmt.Errorf("failed to allocate vxlan id: %v", err)
  256. }
  257. n.setVxlanID(vxlanID)
  258. if err := n.writeToStore(); err != nil {
  259. n.driver.vxlanIdm.Release(n.vxlanID())
  260. n.setVxlanID(0)
  261. if err == datastore.ErrKeyModified {
  262. continue
  263. }
  264. return fmt.Errorf("failed to update data store with vxlan id: %v", err)
  265. }
  266. return nil
  267. }
  268. return fmt.Errorf("failed to obtain vxlan id from data store: %v", err)
  269. }
  270. return nil
  271. }
  272. }