network.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378
  1. package client
  2. import (
  3. "fmt"
  4. "net"
  5. "strings"
  6. "text/tabwriter"
  7. Cli "github.com/docker/docker/cli"
  8. "github.com/docker/docker/opts"
  9. flag "github.com/docker/docker/pkg/mflag"
  10. "github.com/docker/docker/pkg/stringid"
  11. runconfigopts "github.com/docker/docker/runconfig/opts"
  12. "github.com/docker/engine-api/types"
  13. "github.com/docker/engine-api/types/filters"
  14. "github.com/docker/engine-api/types/network"
  15. )
  16. // CmdNetwork is the parent subcommand for all network commands
  17. //
  18. // Usage: docker network <COMMAND> [OPTIONS]
  19. func (cli *DockerCli) CmdNetwork(args ...string) error {
  20. cmd := Cli.Subcmd("network", []string{"COMMAND [OPTIONS]"}, networkUsage(), false)
  21. cmd.Require(flag.Min, 1)
  22. err := cmd.ParseFlags(args, true)
  23. cmd.Usage()
  24. return err
  25. }
  26. // CmdNetworkCreate creates a new network with a given name
  27. //
  28. // Usage: docker network create [OPTIONS] <NETWORK-NAME>
  29. func (cli *DockerCli) CmdNetworkCreate(args ...string) error {
  30. cmd := Cli.Subcmd("network create", []string{"NETWORK-NAME"}, "Creates a new network with a name specified by the user", false)
  31. flDriver := cmd.String([]string{"d", "-driver"}, "bridge", "Driver to manage the Network")
  32. flOpts := opts.NewMapOpts(nil, nil)
  33. flIpamDriver := cmd.String([]string{"-ipam-driver"}, "default", "IP Address Management Driver")
  34. flIpamSubnet := opts.NewListOpts(nil)
  35. flIpamIPRange := opts.NewListOpts(nil)
  36. flIpamGateway := opts.NewListOpts(nil)
  37. flIpamAux := opts.NewMapOpts(nil, nil)
  38. flIpamOpt := opts.NewMapOpts(nil, nil)
  39. cmd.Var(&flIpamSubnet, []string{"-subnet"}, "subnet in CIDR format that represents a network segment")
  40. cmd.Var(&flIpamIPRange, []string{"-ip-range"}, "allocate container ip from a sub-range")
  41. cmd.Var(&flIpamGateway, []string{"-gateway"}, "ipv4 or ipv6 Gateway for the master subnet")
  42. cmd.Var(flIpamAux, []string{"-aux-address"}, "auxiliary ipv4 or ipv6 addresses used by Network driver")
  43. cmd.Var(flOpts, []string{"o", "-opt"}, "set driver specific options")
  44. cmd.Var(flIpamOpt, []string{"-ipam-opt"}, "set IPAM driver specific options")
  45. flInternal := cmd.Bool([]string{"-internal"}, false, "restricts external access to the network")
  46. cmd.Require(flag.Exact, 1)
  47. err := cmd.ParseFlags(args, true)
  48. if err != nil {
  49. return err
  50. }
  51. // Set the default driver to "" if the user didn't set the value.
  52. // That way we can know whether it was user input or not.
  53. driver := *flDriver
  54. if !cmd.IsSet("-driver") && !cmd.IsSet("d") {
  55. driver = ""
  56. }
  57. ipamCfg, err := consolidateIpam(flIpamSubnet.GetAll(), flIpamIPRange.GetAll(), flIpamGateway.GetAll(), flIpamAux.GetAll())
  58. if err != nil {
  59. return err
  60. }
  61. // Construct network create request body
  62. nc := types.NetworkCreate{
  63. Name: cmd.Arg(0),
  64. Driver: driver,
  65. IPAM: network.IPAM{Driver: *flIpamDriver, Config: ipamCfg, Options: flIpamOpt.GetAll()},
  66. Options: flOpts.GetAll(),
  67. CheckDuplicate: true,
  68. Internal: *flInternal,
  69. }
  70. resp, err := cli.client.NetworkCreate(nc)
  71. if err != nil {
  72. return err
  73. }
  74. fmt.Fprintf(cli.out, "%s\n", resp.ID)
  75. return nil
  76. }
  77. // CmdNetworkRm deletes one or more networks
  78. //
  79. // Usage: docker network rm NETWORK-NAME|NETWORK-ID [NETWORK-NAME|NETWORK-ID...]
  80. func (cli *DockerCli) CmdNetworkRm(args ...string) error {
  81. cmd := Cli.Subcmd("network rm", []string{"NETWORK [NETWORK...]"}, "Deletes one or more networks", false)
  82. cmd.Require(flag.Min, 1)
  83. if err := cmd.ParseFlags(args, true); err != nil {
  84. return err
  85. }
  86. status := 0
  87. for _, net := range cmd.Args() {
  88. if err := cli.client.NetworkRemove(net); err != nil {
  89. fmt.Fprintf(cli.err, "%s\n", err)
  90. status = 1
  91. continue
  92. }
  93. }
  94. if status != 0 {
  95. return Cli.StatusError{StatusCode: status}
  96. }
  97. return nil
  98. }
  99. // CmdNetworkConnect connects a container to a network
  100. //
  101. // Usage: docker network connect [OPTIONS] <NETWORK> <CONTAINER>
  102. func (cli *DockerCli) CmdNetworkConnect(args ...string) error {
  103. cmd := Cli.Subcmd("network connect", []string{"NETWORK CONTAINER"}, "Connects a container to a network", false)
  104. flIPAddress := cmd.String([]string{"-ip"}, "", "IP Address")
  105. flIPv6Address := cmd.String([]string{"-ip6"}, "", "IPv6 Address")
  106. flLinks := opts.NewListOpts(runconfigopts.ValidateLink)
  107. cmd.Var(&flLinks, []string{"-link"}, "Add link to another container")
  108. flAliases := opts.NewListOpts(nil)
  109. cmd.Var(&flAliases, []string{"-alias"}, "Add network-scoped alias for the container")
  110. cmd.Require(flag.Min, 2)
  111. if err := cmd.ParseFlags(args, true); err != nil {
  112. return err
  113. }
  114. epConfig := &network.EndpointSettings{
  115. IPAMConfig: &network.EndpointIPAMConfig{
  116. IPv4Address: *flIPAddress,
  117. IPv6Address: *flIPv6Address,
  118. },
  119. Links: flLinks.GetAll(),
  120. Aliases: flAliases.GetAll(),
  121. }
  122. return cli.client.NetworkConnect(cmd.Arg(0), cmd.Arg(1), epConfig)
  123. }
  124. // CmdNetworkDisconnect disconnects a container from a network
  125. //
  126. // Usage: docker network disconnect <NETWORK> <CONTAINER>
  127. func (cli *DockerCli) CmdNetworkDisconnect(args ...string) error {
  128. cmd := Cli.Subcmd("network disconnect", []string{"NETWORK CONTAINER"}, "Disconnects container from a network", false)
  129. force := cmd.Bool([]string{"f", "-force"}, false, "Force the container to disconnect from a network")
  130. cmd.Require(flag.Exact, 2)
  131. if err := cmd.ParseFlags(args, true); err != nil {
  132. return err
  133. }
  134. return cli.client.NetworkDisconnect(cmd.Arg(0), cmd.Arg(1), *force)
  135. }
  136. // CmdNetworkLs lists all the networks managed by docker daemon
  137. //
  138. // Usage: docker network ls [OPTIONS]
  139. func (cli *DockerCli) CmdNetworkLs(args ...string) error {
  140. cmd := Cli.Subcmd("network ls", nil, "Lists networks", true)
  141. quiet := cmd.Bool([]string{"q", "-quiet"}, false, "Only display numeric IDs")
  142. noTrunc := cmd.Bool([]string{"-no-trunc"}, false, "Do not truncate the output")
  143. flFilter := opts.NewListOpts(nil)
  144. cmd.Var(&flFilter, []string{"f", "-filter"}, "Filter output based on conditions provided")
  145. cmd.Require(flag.Exact, 0)
  146. err := cmd.ParseFlags(args, true)
  147. if err != nil {
  148. return err
  149. }
  150. // Consolidate all filter flags, and sanity check them early.
  151. // They'll get process after get response from server.
  152. netFilterArgs := filters.NewArgs()
  153. for _, f := range flFilter.GetAll() {
  154. if netFilterArgs, err = filters.ParseFlag(f, netFilterArgs); err != nil {
  155. return err
  156. }
  157. }
  158. options := types.NetworkListOptions{
  159. Filters: netFilterArgs,
  160. }
  161. networkResources, err := cli.client.NetworkList(options)
  162. if err != nil {
  163. return err
  164. }
  165. wr := tabwriter.NewWriter(cli.out, 20, 1, 3, ' ', 0)
  166. // unless quiet (-q) is specified, print field titles
  167. if !*quiet {
  168. fmt.Fprintln(wr, "NETWORK ID\tNAME\tDRIVER")
  169. }
  170. for _, networkResource := range networkResources {
  171. ID := networkResource.ID
  172. netName := networkResource.Name
  173. if !*noTrunc {
  174. ID = stringid.TruncateID(ID)
  175. }
  176. if *quiet {
  177. fmt.Fprintln(wr, ID)
  178. continue
  179. }
  180. driver := networkResource.Driver
  181. fmt.Fprintf(wr, "%s\t%s\t%s\t",
  182. ID,
  183. netName,
  184. driver)
  185. fmt.Fprint(wr, "\n")
  186. }
  187. wr.Flush()
  188. return nil
  189. }
  190. // CmdNetworkInspect inspects the network object for more details
  191. //
  192. // Usage: docker network inspect [OPTIONS] <NETWORK> [NETWORK...]
  193. func (cli *DockerCli) CmdNetworkInspect(args ...string) error {
  194. cmd := Cli.Subcmd("network inspect", []string{"NETWORK [NETWORK...]"}, "Displays detailed information on one or more networks", false)
  195. tmplStr := cmd.String([]string{"f", "-format"}, "", "Format the output using the given go template")
  196. cmd.Require(flag.Min, 1)
  197. if err := cmd.ParseFlags(args, true); err != nil {
  198. return err
  199. }
  200. inspectSearcher := func(name string) (interface{}, []byte, error) {
  201. i, err := cli.client.NetworkInspect(name)
  202. return i, nil, err
  203. }
  204. return cli.inspectElements(*tmplStr, cmd.Args(), inspectSearcher)
  205. }
  206. // Consolidates the ipam configuration as a group from different related configurations
  207. // user can configure network with multiple non-overlapping subnets and hence it is
  208. // possible to correlate the various related parameters and consolidate them.
  209. // consoidateIpam consolidates subnets, ip-ranges, gateways and auxiliary addresses into
  210. // structured ipam data.
  211. func consolidateIpam(subnets, ranges, gateways []string, auxaddrs map[string]string) ([]network.IPAMConfig, error) {
  212. if len(subnets) < len(ranges) || len(subnets) < len(gateways) {
  213. return nil, fmt.Errorf("every ip-range or gateway must have a corresponding subnet")
  214. }
  215. iData := map[string]*network.IPAMConfig{}
  216. // Populate non-overlapping subnets into consolidation map
  217. for _, s := range subnets {
  218. for k := range iData {
  219. ok1, err := subnetMatches(s, k)
  220. if err != nil {
  221. return nil, err
  222. }
  223. ok2, err := subnetMatches(k, s)
  224. if err != nil {
  225. return nil, err
  226. }
  227. if ok1 || ok2 {
  228. return nil, fmt.Errorf("multiple overlapping subnet configuration is not supported")
  229. }
  230. }
  231. iData[s] = &network.IPAMConfig{Subnet: s, AuxAddress: map[string]string{}}
  232. }
  233. // Validate and add valid ip ranges
  234. for _, r := range ranges {
  235. match := false
  236. for _, s := range subnets {
  237. ok, err := subnetMatches(s, r)
  238. if err != nil {
  239. return nil, err
  240. }
  241. if !ok {
  242. continue
  243. }
  244. if iData[s].IPRange != "" {
  245. return nil, fmt.Errorf("cannot configure multiple ranges (%s, %s) on the same subnet (%s)", r, iData[s].IPRange, s)
  246. }
  247. d := iData[s]
  248. d.IPRange = r
  249. match = true
  250. }
  251. if !match {
  252. return nil, fmt.Errorf("no matching subnet for range %s", r)
  253. }
  254. }
  255. // Validate and add valid gateways
  256. for _, g := range gateways {
  257. match := false
  258. for _, s := range subnets {
  259. ok, err := subnetMatches(s, g)
  260. if err != nil {
  261. return nil, err
  262. }
  263. if !ok {
  264. continue
  265. }
  266. if iData[s].Gateway != "" {
  267. return nil, fmt.Errorf("cannot configure multiple gateways (%s, %s) for the same subnet (%s)", g, iData[s].Gateway, s)
  268. }
  269. d := iData[s]
  270. d.Gateway = g
  271. match = true
  272. }
  273. if !match {
  274. return nil, fmt.Errorf("no matching subnet for gateway %s", g)
  275. }
  276. }
  277. // Validate and add aux-addresses
  278. for key, aa := range auxaddrs {
  279. match := false
  280. for _, s := range subnets {
  281. ok, err := subnetMatches(s, aa)
  282. if err != nil {
  283. return nil, err
  284. }
  285. if !ok {
  286. continue
  287. }
  288. iData[s].AuxAddress[key] = aa
  289. match = true
  290. }
  291. if !match {
  292. return nil, fmt.Errorf("no matching subnet for aux-address %s", aa)
  293. }
  294. }
  295. idl := []network.IPAMConfig{}
  296. for _, v := range iData {
  297. idl = append(idl, *v)
  298. }
  299. return idl, nil
  300. }
  301. func subnetMatches(subnet, data string) (bool, error) {
  302. var (
  303. ip net.IP
  304. )
  305. _, s, err := net.ParseCIDR(subnet)
  306. if err != nil {
  307. return false, fmt.Errorf("Invalid subnet %s : %v", s, err)
  308. }
  309. if strings.Contains(data, "/") {
  310. ip, _, err = net.ParseCIDR(data)
  311. if err != nil {
  312. return false, fmt.Errorf("Invalid cidr %s : %v", data, err)
  313. }
  314. } else {
  315. ip = net.ParseIP(data)
  316. }
  317. return s.Contains(ip), nil
  318. }
  319. func networkUsage() string {
  320. networkCommands := map[string]string{
  321. "create": "Create a network",
  322. "connect": "Connect container to a network",
  323. "disconnect": "Disconnect container from a network",
  324. "inspect": "Display detailed network information",
  325. "ls": "List all networks",
  326. "rm": "Remove a network",
  327. }
  328. help := "Commands:\n"
  329. for cmd, description := range networkCommands {
  330. help += fmt.Sprintf(" %-25.25s%s\n", cmd, description)
  331. }
  332. help += fmt.Sprintf("\nRun 'docker network COMMAND --help' for more information on a command.")
  333. return help
  334. }