namespace_linux.go 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284
  1. package sandbox
  2. import (
  3. "fmt"
  4. "net"
  5. "os"
  6. "runtime"
  7. "sync"
  8. "syscall"
  9. "github.com/vishvananda/netlink"
  10. "github.com/vishvananda/netns"
  11. )
  12. const prefix = "/var/run/docker/netns"
  13. var once sync.Once
  14. // The networkNamespace type is the linux implementation of the Sandbox
  15. // interface. It represents a linux network namespace, and moves an interface
  16. // into it when called on method AddInterface or sets the gateway etc.
  17. type networkNamespace struct {
  18. path string
  19. sinfo *Info
  20. nextIfIndex int
  21. sync.Mutex
  22. }
  23. func createBasePath() {
  24. err := os.MkdirAll(prefix, 0644)
  25. if err != nil && !os.IsExist(err) {
  26. panic("Could not create net namespace path directory")
  27. }
  28. }
  29. // GenerateKey generates a sandbox key based on the passed
  30. // container id.
  31. func GenerateKey(containerID string) string {
  32. maxLen := 12
  33. if len(containerID) < maxLen {
  34. maxLen = len(containerID)
  35. }
  36. return prefix + "/" + containerID[:maxLen]
  37. }
  38. // NewSandbox provides a new sandbox instance created in an os specific way
  39. // provided a key which uniquely identifies the sandbox
  40. func NewSandbox(key string, osCreate bool) (Sandbox, error) {
  41. info, err := createNetworkNamespace(key, osCreate)
  42. if err != nil {
  43. return nil, err
  44. }
  45. return &networkNamespace{path: key, sinfo: info}, nil
  46. }
  47. func createNetworkNamespace(path string, osCreate bool) (*Info, error) {
  48. runtime.LockOSThread()
  49. defer runtime.UnlockOSThread()
  50. origns, err := netns.Get()
  51. if err != nil {
  52. return nil, err
  53. }
  54. defer origns.Close()
  55. if err := createNamespaceFile(path); err != nil {
  56. return nil, err
  57. }
  58. if osCreate {
  59. defer netns.Set(origns)
  60. newns, err := netns.New()
  61. if err != nil {
  62. return nil, err
  63. }
  64. defer newns.Close()
  65. if err := loopbackUp(); err != nil {
  66. return nil, err
  67. }
  68. }
  69. procNet := fmt.Sprintf("/proc/%d/task/%d/ns/net", os.Getpid(), syscall.Gettid())
  70. if err := syscall.Mount(procNet, path, "bind", syscall.MS_BIND, ""); err != nil {
  71. return nil, err
  72. }
  73. interfaces := []*Interface{}
  74. info := &Info{Interfaces: interfaces}
  75. return info, nil
  76. }
  77. func cleanupNamespaceFile(path string) {
  78. if _, err := os.Stat(path); err == nil {
  79. n := &networkNamespace{path: path}
  80. n.Destroy()
  81. }
  82. }
  83. func createNamespaceFile(path string) (err error) {
  84. var f *os.File
  85. once.Do(createBasePath)
  86. // cleanup namespace file if it already exists because of a previous ungraceful exit.
  87. cleanupNamespaceFile(path)
  88. if f, err = os.Create(path); err == nil {
  89. f.Close()
  90. }
  91. return err
  92. }
  93. func loopbackUp() error {
  94. iface, err := netlink.LinkByName("lo")
  95. if err != nil {
  96. return err
  97. }
  98. return netlink.LinkSetUp(iface)
  99. }
  100. func (n *networkNamespace) RemoveInterface(i *Interface) error {
  101. runtime.LockOSThread()
  102. defer runtime.UnlockOSThread()
  103. origns, err := netns.Get()
  104. if err != nil {
  105. return err
  106. }
  107. defer origns.Close()
  108. f, err := os.OpenFile(n.path, os.O_RDONLY, 0)
  109. if err != nil {
  110. return fmt.Errorf("failed get network namespace %q: %v", n.path, err)
  111. }
  112. defer f.Close()
  113. nsFD := f.Fd()
  114. if err = netns.Set(netns.NsHandle(nsFD)); err != nil {
  115. return err
  116. }
  117. defer netns.Set(origns)
  118. // Find the network inteerface identified by the DstName attribute.
  119. iface, err := netlink.LinkByName(i.DstName)
  120. if err != nil {
  121. return err
  122. }
  123. // Down the interface before configuring
  124. if err := netlink.LinkSetDown(iface); err != nil {
  125. return err
  126. }
  127. err = netlink.LinkSetName(iface, i.SrcName)
  128. if err != nil {
  129. fmt.Println("LinkSetName failed: ", err)
  130. return err
  131. }
  132. // Move the network interface to caller namespace.
  133. if err := netlink.LinkSetNsFd(iface, int(origns)); err != nil {
  134. fmt.Println("LinkSetNsPid failed: ", err)
  135. return err
  136. }
  137. n.Lock()
  138. for index, intf := range n.sinfo.Interfaces {
  139. if intf == i {
  140. n.sinfo.Interfaces = append(n.sinfo.Interfaces[:index], n.sinfo.Interfaces[index+1:]...)
  141. break
  142. }
  143. }
  144. n.Unlock()
  145. return nil
  146. }
  147. func (n *networkNamespace) AddInterface(i *Interface) error {
  148. n.Lock()
  149. i.DstName = fmt.Sprintf("%s%d", i.DstName, n.nextIfIndex)
  150. n.nextIfIndex++
  151. n.Unlock()
  152. runtime.LockOSThread()
  153. defer runtime.UnlockOSThread()
  154. origns, err := netns.Get()
  155. if err != nil {
  156. return err
  157. }
  158. defer origns.Close()
  159. f, err := os.OpenFile(n.path, os.O_RDONLY, 0)
  160. if err != nil {
  161. return fmt.Errorf("failed get network namespace %q: %v", n.path, err)
  162. }
  163. defer f.Close()
  164. // Find the network interface identified by the SrcName attribute.
  165. iface, err := netlink.LinkByName(i.SrcName)
  166. if err != nil {
  167. return err
  168. }
  169. // Move the network interface to the destination namespace.
  170. nsFD := f.Fd()
  171. if err := netlink.LinkSetNsFd(iface, int(nsFD)); err != nil {
  172. return err
  173. }
  174. if err = netns.Set(netns.NsHandle(nsFD)); err != nil {
  175. return err
  176. }
  177. defer netns.Set(origns)
  178. // Down the interface before configuring
  179. if err := netlink.LinkSetDown(iface); err != nil {
  180. return err
  181. }
  182. // Configure the interface now this is moved in the proper namespace.
  183. if err := configureInterface(iface, i); err != nil {
  184. return err
  185. }
  186. // Up the interface.
  187. if err := netlink.LinkSetUp(iface); err != nil {
  188. return err
  189. }
  190. n.Lock()
  191. n.sinfo.Interfaces = append(n.sinfo.Interfaces, i)
  192. n.Unlock()
  193. return nil
  194. }
  195. func (n *networkNamespace) SetGateway(gw net.IP) error {
  196. if len(gw) == 0 {
  197. return nil
  198. }
  199. err := programGateway(n.path, gw)
  200. if err == nil {
  201. n.sinfo.Gateway = gw
  202. }
  203. return err
  204. }
  205. func (n *networkNamespace) SetGatewayIPv6(gw net.IP) error {
  206. if len(gw) == 0 {
  207. return nil
  208. }
  209. err := programGateway(n.path, gw)
  210. if err == nil {
  211. n.sinfo.GatewayIPv6 = gw
  212. }
  213. return err
  214. }
  215. func (n *networkNamespace) Interfaces() []*Interface {
  216. n.Lock()
  217. defer n.Unlock()
  218. return n.sinfo.Interfaces
  219. }
  220. func (n *networkNamespace) Key() string {
  221. return n.path
  222. }
  223. func (n *networkNamespace) Destroy() error {
  224. // Assuming no running process is executing in this network namespace,
  225. // unmounting is sufficient to destroy it.
  226. if err := syscall.Unmount(n.path, syscall.MNT_DETACH); err != nil {
  227. return err
  228. }
  229. return os.Remove(n.path)
  230. }