network.go 9.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302
  1. package controlapi
  2. import (
  3. "net"
  4. "github.com/docker/docker/pkg/plugingetter"
  5. "github.com/docker/libnetwork/driverapi"
  6. "github.com/docker/libnetwork/ipamapi"
  7. "github.com/docker/swarmkit/api"
  8. "github.com/docker/swarmkit/identity"
  9. "github.com/docker/swarmkit/manager/allocator"
  10. "github.com/docker/swarmkit/manager/allocator/networkallocator"
  11. "github.com/docker/swarmkit/manager/state/store"
  12. "golang.org/x/net/context"
  13. "google.golang.org/grpc"
  14. "google.golang.org/grpc/codes"
  15. )
  16. func validateIPAMConfiguration(ipamConf *api.IPAMConfig) error {
  17. if ipamConf == nil {
  18. return grpc.Errorf(codes.InvalidArgument, "ipam configuration: cannot be empty")
  19. }
  20. _, subnet, err := net.ParseCIDR(ipamConf.Subnet)
  21. if err != nil {
  22. return grpc.Errorf(codes.InvalidArgument, "ipam configuration: invalid subnet %s", ipamConf.Subnet)
  23. }
  24. if ipamConf.Range != "" {
  25. ip, _, err := net.ParseCIDR(ipamConf.Range)
  26. if err != nil {
  27. return grpc.Errorf(codes.InvalidArgument, "ipam configuration: invalid range %s", ipamConf.Range)
  28. }
  29. if !subnet.Contains(ip) {
  30. return grpc.Errorf(codes.InvalidArgument, "ipam configuration: subnet %s does not contain range %s", ipamConf.Subnet, ipamConf.Range)
  31. }
  32. }
  33. if ipamConf.Gateway != "" {
  34. ip := net.ParseIP(ipamConf.Gateway)
  35. if ip == nil {
  36. return grpc.Errorf(codes.InvalidArgument, "ipam configuration: invalid gateway %s", ipamConf.Gateway)
  37. }
  38. if !subnet.Contains(ip) {
  39. return grpc.Errorf(codes.InvalidArgument, "ipam configuration: subnet %s does not contain gateway %s", ipamConf.Subnet, ipamConf.Gateway)
  40. }
  41. }
  42. return nil
  43. }
  44. func validateIPAM(ipam *api.IPAMOptions, pg plugingetter.PluginGetter) error {
  45. if ipam == nil {
  46. // It is ok to not specify any IPAM configurations. We
  47. // will choose good defaults.
  48. return nil
  49. }
  50. if err := validateDriver(ipam.Driver, pg, ipamapi.PluginEndpointType); err != nil {
  51. return err
  52. }
  53. for _, ipamConf := range ipam.Configs {
  54. if err := validateIPAMConfiguration(ipamConf); err != nil {
  55. return err
  56. }
  57. }
  58. return nil
  59. }
  60. func validateNetworkSpec(spec *api.NetworkSpec, pg plugingetter.PluginGetter) error {
  61. if spec == nil {
  62. return grpc.Errorf(codes.InvalidArgument, errInvalidArgument.Error())
  63. }
  64. if spec.Ingress && spec.DriverConfig != nil && spec.DriverConfig.Name != "overlay" {
  65. return grpc.Errorf(codes.Unimplemented, "only overlay driver is currently supported for ingress network")
  66. }
  67. if spec.Attachable && spec.Ingress {
  68. return grpc.Errorf(codes.InvalidArgument, "ingress network cannot be attachable")
  69. }
  70. if err := validateAnnotations(spec.Annotations); err != nil {
  71. return err
  72. }
  73. if _, ok := spec.Annotations.Labels[networkallocator.PredefinedLabel]; ok {
  74. return grpc.Errorf(codes.PermissionDenied, "label %s is for internally created predefined networks and cannot be applied by users",
  75. networkallocator.PredefinedLabel)
  76. }
  77. if err := validateDriver(spec.DriverConfig, pg, driverapi.NetworkPluginEndpointType); err != nil {
  78. return err
  79. }
  80. if err := validateIPAM(spec.IPAM, pg); err != nil {
  81. return err
  82. }
  83. return nil
  84. }
  85. // CreateNetwork creates and returns a Network based on the provided NetworkSpec.
  86. // - Returns `InvalidArgument` if the NetworkSpec is malformed.
  87. // - Returns an error if the creation fails.
  88. func (s *Server) CreateNetwork(ctx context.Context, request *api.CreateNetworkRequest) (*api.CreateNetworkResponse, error) {
  89. if err := validateNetworkSpec(request.Spec, s.pg); err != nil {
  90. return nil, err
  91. }
  92. // TODO(mrjana): Consider using `Name` as a primary key to handle
  93. // duplicate creations. See #65
  94. n := &api.Network{
  95. ID: identity.NewID(),
  96. Spec: *request.Spec,
  97. }
  98. err := s.store.Update(func(tx store.Tx) error {
  99. if request.Spec.Ingress {
  100. if n, err := allocator.GetIngressNetwork(s.store); err == nil {
  101. return grpc.Errorf(codes.AlreadyExists, "ingress network (%s) is already present", n.ID)
  102. } else if err != allocator.ErrNoIngress {
  103. return grpc.Errorf(codes.Internal, "failed ingress network presence check: %v", err)
  104. }
  105. }
  106. return store.CreateNetwork(tx, n)
  107. })
  108. if err != nil {
  109. return nil, err
  110. }
  111. return &api.CreateNetworkResponse{
  112. Network: n,
  113. }, nil
  114. }
  115. // GetNetwork returns a Network given a NetworkID.
  116. // - Returns `InvalidArgument` if NetworkID is not provided.
  117. // - Returns `NotFound` if the Network is not found.
  118. func (s *Server) GetNetwork(ctx context.Context, request *api.GetNetworkRequest) (*api.GetNetworkResponse, error) {
  119. if request.NetworkID == "" {
  120. return nil, grpc.Errorf(codes.InvalidArgument, errInvalidArgument.Error())
  121. }
  122. var n *api.Network
  123. s.store.View(func(tx store.ReadTx) {
  124. n = store.GetNetwork(tx, request.NetworkID)
  125. })
  126. if n == nil {
  127. return nil, grpc.Errorf(codes.NotFound, "network %s not found", request.NetworkID)
  128. }
  129. return &api.GetNetworkResponse{
  130. Network: n,
  131. }, nil
  132. }
  133. // RemoveNetwork removes a Network referenced by NetworkID.
  134. // - Returns `InvalidArgument` if NetworkID is not provided.
  135. // - Returns `NotFound` if the Network is not found.
  136. // - Returns an error if the deletion fails.
  137. func (s *Server) RemoveNetwork(ctx context.Context, request *api.RemoveNetworkRequest) (*api.RemoveNetworkResponse, error) {
  138. if request.NetworkID == "" {
  139. return nil, grpc.Errorf(codes.InvalidArgument, errInvalidArgument.Error())
  140. }
  141. var (
  142. n *api.Network
  143. rm = s.removeNetwork
  144. )
  145. s.store.View(func(tx store.ReadTx) {
  146. n = store.GetNetwork(tx, request.NetworkID)
  147. })
  148. if n == nil {
  149. return nil, grpc.Errorf(codes.NotFound, "network %s not found", request.NetworkID)
  150. }
  151. if allocator.IsIngressNetwork(n) {
  152. rm = s.removeIngressNetwork
  153. }
  154. if v, ok := n.Spec.Annotations.Labels[networkallocator.PredefinedLabel]; ok && v == "true" {
  155. return nil, grpc.Errorf(codes.FailedPrecondition, "network %s (%s) is a swarm predefined network and cannot be removed",
  156. request.NetworkID, n.Spec.Annotations.Name)
  157. }
  158. if err := rm(n.ID); err != nil {
  159. if err == store.ErrNotExist {
  160. return nil, grpc.Errorf(codes.NotFound, "network %s not found", request.NetworkID)
  161. }
  162. return nil, err
  163. }
  164. return &api.RemoveNetworkResponse{}, nil
  165. }
  166. func (s *Server) removeNetwork(id string) error {
  167. return s.store.Update(func(tx store.Tx) error {
  168. services, err := store.FindServices(tx, store.ByReferencedNetworkID(id))
  169. if err != nil {
  170. return grpc.Errorf(codes.Internal, "could not find services using network %s: %v", id, err)
  171. }
  172. if len(services) != 0 {
  173. return grpc.Errorf(codes.FailedPrecondition, "network %s is in use by service %s", id, services[0].ID)
  174. }
  175. tasks, err := store.FindTasks(tx, store.ByReferencedNetworkID(id))
  176. if err != nil {
  177. return grpc.Errorf(codes.Internal, "could not find tasks using network %s: %v", id, err)
  178. }
  179. for _, t := range tasks {
  180. if t.DesiredState <= api.TaskStateRunning && t.Status.State <= api.TaskStateRunning {
  181. return grpc.Errorf(codes.FailedPrecondition, "network %s is in use by task %s", id, t.ID)
  182. }
  183. }
  184. return store.DeleteNetwork(tx, id)
  185. })
  186. }
  187. func (s *Server) removeIngressNetwork(id string) error {
  188. return s.store.Update(func(tx store.Tx) error {
  189. services, err := store.FindServices(tx, store.All)
  190. if err != nil {
  191. return grpc.Errorf(codes.Internal, "could not find services using network %s: %v", id, err)
  192. }
  193. for _, srv := range services {
  194. if allocator.IsIngressNetworkNeeded(srv) {
  195. return grpc.Errorf(codes.FailedPrecondition, "ingress network cannot be removed because service %s depends on it", srv.ID)
  196. }
  197. }
  198. return store.DeleteNetwork(tx, id)
  199. })
  200. }
  201. func filterNetworks(candidates []*api.Network, filters ...func(*api.Network) bool) []*api.Network {
  202. result := []*api.Network{}
  203. for _, c := range candidates {
  204. match := true
  205. for _, f := range filters {
  206. if !f(c) {
  207. match = false
  208. break
  209. }
  210. }
  211. if match {
  212. result = append(result, c)
  213. }
  214. }
  215. return result
  216. }
  217. // ListNetworks returns a list of all networks.
  218. func (s *Server) ListNetworks(ctx context.Context, request *api.ListNetworksRequest) (*api.ListNetworksResponse, error) {
  219. var (
  220. networks []*api.Network
  221. err error
  222. )
  223. s.store.View(func(tx store.ReadTx) {
  224. switch {
  225. case request.Filters != nil && len(request.Filters.Names) > 0:
  226. networks, err = store.FindNetworks(tx, buildFilters(store.ByName, request.Filters.Names))
  227. case request.Filters != nil && len(request.Filters.NamePrefixes) > 0:
  228. networks, err = store.FindNetworks(tx, buildFilters(store.ByNamePrefix, request.Filters.NamePrefixes))
  229. case request.Filters != nil && len(request.Filters.IDPrefixes) > 0:
  230. networks, err = store.FindNetworks(tx, buildFilters(store.ByIDPrefix, request.Filters.IDPrefixes))
  231. default:
  232. networks, err = store.FindNetworks(tx, store.All)
  233. }
  234. })
  235. if err != nil {
  236. return nil, err
  237. }
  238. if request.Filters != nil {
  239. networks = filterNetworks(networks,
  240. func(e *api.Network) bool {
  241. return filterContains(e.Spec.Annotations.Name, request.Filters.Names)
  242. },
  243. func(e *api.Network) bool {
  244. return filterContainsPrefix(e.Spec.Annotations.Name, request.Filters.NamePrefixes)
  245. },
  246. func(e *api.Network) bool {
  247. return filterContainsPrefix(e.ID, request.Filters.IDPrefixes)
  248. },
  249. func(e *api.Network) bool {
  250. return filterMatchLabels(e.Spec.Annotations.Labels, request.Filters.Labels)
  251. },
  252. )
  253. }
  254. return &api.ListNetworksResponse{
  255. Networks: networks,
  256. }, nil
  257. }