setup_ipv4.go 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146
  1. package bridge
  2. import (
  3. "fmt"
  4. "io/ioutil"
  5. "net"
  6. "path/filepath"
  7. log "github.com/Sirupsen/logrus"
  8. "github.com/docker/libnetwork/netutils"
  9. "github.com/vishvananda/netlink"
  10. )
  11. var bridgeNetworks []*net.IPNet
  12. func init() {
  13. // Here we don't follow the convention of using the 1st IP of the range for the gateway.
  14. // This is to use the same gateway IPs as the /24 ranges, which predate the /16 ranges.
  15. // In theory this shouldn't matter - in practice there's bound to be a few scripts relying
  16. // on the internal addressing or other stupid things like that.
  17. // They shouldn't, but hey, let's not break them unless we really have to.
  18. // Don't use 172.16.0.0/16, it conflicts with EC2 DNS 172.16.0.23
  19. // 172.[17-31].42.1/16
  20. mask := []byte{255, 255, 0, 0}
  21. for i := 17; i < 32; i++ {
  22. bridgeNetworks = append(bridgeNetworks, &net.IPNet{IP: []byte{172, byte(i), 42, 1}, Mask: mask})
  23. }
  24. // 10.[0-255].42.1/16
  25. for i := 0; i < 256; i++ {
  26. bridgeNetworks = append(bridgeNetworks, &net.IPNet{IP: []byte{10, byte(i), 42, 1}, Mask: mask})
  27. }
  28. // 192.168.[42-44].1/24
  29. mask24 := []byte{255, 255, 255, 0}
  30. for i := 42; i < 45; i++ {
  31. bridgeNetworks = append(bridgeNetworks, &net.IPNet{IP: []byte{192, 168, byte(i), 1}, Mask: mask24})
  32. }
  33. }
  34. func setupBridgeIPv4(config *networkConfiguration, i *bridgeInterface) error {
  35. addrv4, _, err := i.addresses()
  36. if err != nil {
  37. return err
  38. }
  39. // Check if we have an IP address already on the bridge.
  40. if addrv4.IPNet != nil {
  41. // Make sure to store bridge network and default gateway before getting out.
  42. i.bridgeIPv4 = addrv4.IPNet
  43. i.gatewayIPv4 = addrv4.IPNet.IP
  44. return nil
  45. }
  46. // Do not try to configure IPv4 on a non-default bridge unless you are
  47. // specifically asked to do so.
  48. if config.BridgeName != DefaultBridgeName && !config.AllowNonDefaultBridge {
  49. return NonDefaultBridgeExistError(config.BridgeName)
  50. }
  51. bridgeIPv4, err := electBridgeIPv4(config)
  52. if err != nil {
  53. return err
  54. }
  55. log.Debugf("Creating bridge interface %q with network %s", config.BridgeName, bridgeIPv4)
  56. if err := netlink.AddrAdd(i.Link, &netlink.Addr{IPNet: bridgeIPv4}); err != nil {
  57. return &IPv4AddrAddError{IP: bridgeIPv4, Err: err}
  58. }
  59. // Store bridge network and default gateway
  60. i.bridgeIPv4 = bridgeIPv4
  61. i.gatewayIPv4 = i.bridgeIPv4.IP
  62. return nil
  63. }
  64. func allocateBridgeIP(config *networkConfiguration, i *bridgeInterface) error {
  65. // Because of the way ipallocator manages the container address space,
  66. // reserve bridge address only if it belongs to the container network
  67. // (if defined), no need otherwise
  68. if config.FixedCIDR == nil || config.FixedCIDR.Contains(i.bridgeIPv4.IP) {
  69. ipAllocator.RequestIP(i.bridgeIPv4, i.bridgeIPv4.IP)
  70. }
  71. return nil
  72. }
  73. func electBridgeIPv4(config *networkConfiguration) (*net.IPNet, error) {
  74. // Use the requested IPv4 CIDR when available.
  75. if config.AddressIPv4 != nil {
  76. return config.AddressIPv4, nil
  77. }
  78. // We don't check for an error here, because we don't really care if we
  79. // can't read /etc/resolv.conf. So instead we skip the append if resolvConf
  80. // is nil. It either doesn't exist, or we can't read it for some reason.
  81. nameservers := []string{}
  82. if resolvConf, _ := readResolvConf(); resolvConf != nil {
  83. nameservers = append(nameservers, getNameserversAsCIDR(resolvConf)...)
  84. }
  85. // Try to automatically elect appropriate bridge IPv4 settings.
  86. for _, n := range bridgeNetworks {
  87. if err := netutils.CheckNameserverOverlaps(nameservers, n); err == nil {
  88. if err := netutils.CheckRouteOverlaps(n); err == nil {
  89. return n, nil
  90. }
  91. }
  92. }
  93. return nil, IPv4AddrRangeError(config.BridgeName)
  94. }
  95. func setupGatewayIPv4(config *networkConfiguration, i *bridgeInterface) error {
  96. if !i.bridgeIPv4.Contains(config.DefaultGatewayIPv4) {
  97. return &ErrInvalidGateway{}
  98. }
  99. // Because of the way ipallocator manages the container address space,
  100. // reserve default gw address only if it belongs to the container network
  101. // (if defined), no need otherwise
  102. if config.FixedCIDR == nil || config.FixedCIDR.Contains(config.DefaultGatewayIPv4) {
  103. if _, err := ipAllocator.RequestIP(i.bridgeIPv4, config.DefaultGatewayIPv4); err != nil {
  104. return err
  105. }
  106. }
  107. // Store requested default gateway
  108. i.gatewayIPv4 = config.DefaultGatewayIPv4
  109. return nil
  110. }
  111. func setupLoopbackAdressesRouting(config *networkConfiguration, i *bridgeInterface) error {
  112. sysPath := filepath.Join("/proc/sys/net/ipv4/conf", config.BridgeName, "route_localnet")
  113. ipv4LoRoutingData, err := ioutil.ReadFile(sysPath)
  114. if err != nil {
  115. return fmt.Errorf("Cannot read IPv4 local routing setup: %v", err)
  116. }
  117. // Enable loopback adresses routing only if it isn't already enabled
  118. if ipv4LoRoutingData[0] != '1' {
  119. if err := ioutil.WriteFile(sysPath, []byte{'1', '\n'}, 0644); err != nil {
  120. return fmt.Errorf("Unable to enable local routing for hairpin mode: %v", err)
  121. }
  122. }
  123. return nil
  124. }