ov_utils.go 4.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161
  1. package overlay
  2. import (
  3. "fmt"
  4. "strings"
  5. "syscall"
  6. "github.com/Sirupsen/logrus"
  7. "github.com/docker/libnetwork/netutils"
  8. "github.com/docker/libnetwork/ns"
  9. "github.com/docker/libnetwork/osl"
  10. "github.com/vishvananda/netlink"
  11. "github.com/vishvananda/netns"
  12. )
  13. var soTimeout = ns.NetlinkSocketsTimeout
  14. func validateID(nid, eid string) error {
  15. if nid == "" {
  16. return fmt.Errorf("invalid network id")
  17. }
  18. if eid == "" {
  19. return fmt.Errorf("invalid endpoint id")
  20. }
  21. return nil
  22. }
  23. func createVethPair() (string, string, error) {
  24. defer osl.InitOSContext()()
  25. nlh := ns.NlHandle()
  26. // Generate a name for what will be the host side pipe interface
  27. name1, err := netutils.GenerateIfaceName(nlh, vethPrefix, vethLen)
  28. if err != nil {
  29. return "", "", fmt.Errorf("error generating veth name1: %v", err)
  30. }
  31. // Generate a name for what will be the sandbox side pipe interface
  32. name2, err := netutils.GenerateIfaceName(nlh, vethPrefix, vethLen)
  33. if err != nil {
  34. return "", "", fmt.Errorf("error generating veth name2: %v", err)
  35. }
  36. // Generate and add the interface pipe host <-> sandbox
  37. veth := &netlink.Veth{
  38. LinkAttrs: netlink.LinkAttrs{Name: name1, TxQLen: 0},
  39. PeerName: name2}
  40. if err := nlh.LinkAdd(veth); err != nil {
  41. return "", "", fmt.Errorf("error creating veth pair: %v", err)
  42. }
  43. return name1, name2, nil
  44. }
  45. func createVxlan(name string, vni uint32, mtu int) error {
  46. defer osl.InitOSContext()()
  47. vxlan := &netlink.Vxlan{
  48. LinkAttrs: netlink.LinkAttrs{Name: name, MTU: mtu},
  49. VxlanId: int(vni),
  50. Learning: true,
  51. Port: vxlanPort,
  52. Proxy: true,
  53. L3miss: true,
  54. L2miss: true,
  55. }
  56. if err := ns.NlHandle().LinkAdd(vxlan); err != nil {
  57. return fmt.Errorf("error creating vxlan interface: %v", err)
  58. }
  59. return nil
  60. }
  61. func deleteInterfaceBySubnet(brPrefix string, s *subnet) error {
  62. defer osl.InitOSContext()()
  63. nlh := ns.NlHandle()
  64. links, err := nlh.LinkList()
  65. if err != nil {
  66. return fmt.Errorf("failed to list interfaces while deleting bridge interface by subnet: %v", err)
  67. }
  68. for _, l := range links {
  69. name := l.Attrs().Name
  70. if _, ok := l.(*netlink.Bridge); ok && strings.HasPrefix(name, brPrefix) {
  71. addrList, err := nlh.AddrList(l, netlink.FAMILY_V4)
  72. if err != nil {
  73. logrus.Errorf("error getting AddressList for bridge %s", name)
  74. continue
  75. }
  76. for _, addr := range addrList {
  77. if netutils.NetworkOverlaps(addr.IPNet, s.subnetIP) {
  78. err = nlh.LinkDel(l)
  79. if err != nil {
  80. logrus.Errorf("error deleting bridge (%s) with subnet %v: %v", name, addr.IPNet, err)
  81. }
  82. }
  83. }
  84. }
  85. }
  86. return nil
  87. }
  88. func deleteInterface(name string) error {
  89. defer osl.InitOSContext()()
  90. link, err := ns.NlHandle().LinkByName(name)
  91. if err != nil {
  92. return fmt.Errorf("failed to find interface with name %s: %v", name, err)
  93. }
  94. if err := ns.NlHandle().LinkDel(link); err != nil {
  95. return fmt.Errorf("error deleting interface with name %s: %v", name, err)
  96. }
  97. return nil
  98. }
  99. func deleteVxlanByVNI(path string, vni uint32) error {
  100. defer osl.InitOSContext()()
  101. nlh := ns.NlHandle()
  102. if path != "" {
  103. ns, err := netns.GetFromPath(path)
  104. if err != nil {
  105. return fmt.Errorf("failed to get ns handle for %s: %v", path, err)
  106. }
  107. defer ns.Close()
  108. nlh, err = netlink.NewHandleAt(ns, syscall.NETLINK_ROUTE)
  109. if err != nil {
  110. return fmt.Errorf("failed to get netlink handle for ns %s: %v", path, err)
  111. }
  112. defer nlh.Delete()
  113. err = nlh.SetSocketTimeout(soTimeout)
  114. if err != nil {
  115. logrus.Warnf("Failed to set the timeout on the netlink handle sockets for vxlan deletion: %v", err)
  116. }
  117. }
  118. links, err := nlh.LinkList()
  119. if err != nil {
  120. return fmt.Errorf("failed to list interfaces while deleting vxlan interface by vni: %v", err)
  121. }
  122. for _, l := range links {
  123. if l.Type() == "vxlan" && (vni == 0 || l.(*netlink.Vxlan).VxlanId == int(vni)) {
  124. err = nlh.LinkDel(l)
  125. if err != nil {
  126. return fmt.Errorf("error deleting vxlan interface with id %d: %v", vni, err)
  127. }
  128. return nil
  129. }
  130. }
  131. return fmt.Errorf("could not find a vxlan interface to delete with id %d", vni)
  132. }