create.go 6.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231
  1. package network
  2. import (
  3. "fmt"
  4. "net"
  5. "strings"
  6. "golang.org/x/net/context"
  7. "github.com/docker/docker/api/types"
  8. "github.com/docker/docker/api/types/network"
  9. "github.com/docker/docker/cli"
  10. "github.com/docker/docker/cli/command"
  11. "github.com/docker/docker/opts"
  12. runconfigopts "github.com/docker/docker/runconfig/opts"
  13. "github.com/spf13/cobra"
  14. )
  15. type createOptions struct {
  16. name string
  17. driver string
  18. driverOpts opts.MapOpts
  19. labels opts.ListOpts
  20. internal bool
  21. ipv6 bool
  22. attachable bool
  23. ingress bool
  24. ipamDriver string
  25. ipamSubnet []string
  26. ipamIPRange []string
  27. ipamGateway []string
  28. ipamAux opts.MapOpts
  29. ipamOpt opts.MapOpts
  30. }
  31. func newCreateCommand(dockerCli *command.DockerCli) *cobra.Command {
  32. opts := createOptions{
  33. driverOpts: *opts.NewMapOpts(nil, nil),
  34. labels: opts.NewListOpts(opts.ValidateEnv),
  35. ipamAux: *opts.NewMapOpts(nil, nil),
  36. ipamOpt: *opts.NewMapOpts(nil, nil),
  37. }
  38. cmd := &cobra.Command{
  39. Use: "create [OPTIONS] NETWORK",
  40. Short: "Create a network",
  41. Args: cli.ExactArgs(1),
  42. RunE: func(cmd *cobra.Command, args []string) error {
  43. opts.name = args[0]
  44. return runCreate(dockerCli, opts)
  45. },
  46. }
  47. flags := cmd.Flags()
  48. flags.StringVarP(&opts.driver, "driver", "d", "bridge", "Driver to manage the Network")
  49. flags.VarP(&opts.driverOpts, "opt", "o", "Set driver specific options")
  50. flags.Var(&opts.labels, "label", "Set metadata on a network")
  51. flags.BoolVar(&opts.internal, "internal", false, "Restrict external access to the network")
  52. flags.BoolVar(&opts.ipv6, "ipv6", false, "Enable IPv6 networking")
  53. flags.BoolVar(&opts.attachable, "attachable", false, "Enable manual container attachment")
  54. flags.SetAnnotation("attachable", "version", []string{"1.25"})
  55. flags.BoolVar(&opts.ingress, "ingress", false, "Create swarm routing-mesh network")
  56. flags.SetAnnotation("ingress", "version", []string{"1.29"})
  57. flags.StringVar(&opts.ipamDriver, "ipam-driver", "default", "IP Address Management Driver")
  58. flags.StringSliceVar(&opts.ipamSubnet, "subnet", []string{}, "Subnet in CIDR format that represents a network segment")
  59. flags.StringSliceVar(&opts.ipamIPRange, "ip-range", []string{}, "Allocate container ip from a sub-range")
  60. flags.StringSliceVar(&opts.ipamGateway, "gateway", []string{}, "IPv4 or IPv6 Gateway for the master subnet")
  61. flags.Var(&opts.ipamAux, "aux-address", "Auxiliary IPv4 or IPv6 addresses used by Network driver")
  62. flags.Var(&opts.ipamOpt, "ipam-opt", "Set IPAM driver specific options")
  63. return cmd
  64. }
  65. func runCreate(dockerCli *command.DockerCli, opts createOptions) error {
  66. client := dockerCli.Client()
  67. ipamCfg, err := consolidateIpam(opts.ipamSubnet, opts.ipamIPRange, opts.ipamGateway, opts.ipamAux.GetAll())
  68. if err != nil {
  69. return err
  70. }
  71. // Construct network create request body
  72. nc := types.NetworkCreate{
  73. Driver: opts.driver,
  74. Options: opts.driverOpts.GetAll(),
  75. IPAM: &network.IPAM{
  76. Driver: opts.ipamDriver,
  77. Config: ipamCfg,
  78. Options: opts.ipamOpt.GetAll(),
  79. },
  80. CheckDuplicate: true,
  81. Internal: opts.internal,
  82. EnableIPv6: opts.ipv6,
  83. Attachable: opts.attachable,
  84. Ingress: opts.ingress,
  85. Labels: runconfigopts.ConvertKVStringsToMap(opts.labels.GetAll()),
  86. }
  87. resp, err := client.NetworkCreate(context.Background(), opts.name, nc)
  88. if err != nil {
  89. return err
  90. }
  91. fmt.Fprintf(dockerCli.Out(), "%s\n", resp.ID)
  92. return nil
  93. }
  94. // Consolidates the ipam configuration as a group from different related configurations
  95. // user can configure network with multiple non-overlapping subnets and hence it is
  96. // possible to correlate the various related parameters and consolidate them.
  97. // consolidateIpam consolidates subnets, ip-ranges, gateways and auxiliary addresses into
  98. // structured ipam data.
  99. func consolidateIpam(subnets, ranges, gateways []string, auxaddrs map[string]string) ([]network.IPAMConfig, error) {
  100. if len(subnets) < len(ranges) || len(subnets) < len(gateways) {
  101. return nil, fmt.Errorf("every ip-range or gateway must have a corresponding subnet")
  102. }
  103. iData := map[string]*network.IPAMConfig{}
  104. // Populate non-overlapping subnets into consolidation map
  105. for _, s := range subnets {
  106. for k := range iData {
  107. ok1, err := subnetMatches(s, k)
  108. if err != nil {
  109. return nil, err
  110. }
  111. ok2, err := subnetMatches(k, s)
  112. if err != nil {
  113. return nil, err
  114. }
  115. if ok1 || ok2 {
  116. return nil, fmt.Errorf("multiple overlapping subnet configuration is not supported")
  117. }
  118. }
  119. iData[s] = &network.IPAMConfig{Subnet: s, AuxAddress: map[string]string{}}
  120. }
  121. // Validate and add valid ip ranges
  122. for _, r := range ranges {
  123. match := false
  124. for _, s := range subnets {
  125. ok, err := subnetMatches(s, r)
  126. if err != nil {
  127. return nil, err
  128. }
  129. if !ok {
  130. continue
  131. }
  132. if iData[s].IPRange != "" {
  133. return nil, fmt.Errorf("cannot configure multiple ranges (%s, %s) on the same subnet (%s)", r, iData[s].IPRange, s)
  134. }
  135. d := iData[s]
  136. d.IPRange = r
  137. match = true
  138. }
  139. if !match {
  140. return nil, fmt.Errorf("no matching subnet for range %s", r)
  141. }
  142. }
  143. // Validate and add valid gateways
  144. for _, g := range gateways {
  145. match := false
  146. for _, s := range subnets {
  147. ok, err := subnetMatches(s, g)
  148. if err != nil {
  149. return nil, err
  150. }
  151. if !ok {
  152. continue
  153. }
  154. if iData[s].Gateway != "" {
  155. return nil, fmt.Errorf("cannot configure multiple gateways (%s, %s) for the same subnet (%s)", g, iData[s].Gateway, s)
  156. }
  157. d := iData[s]
  158. d.Gateway = g
  159. match = true
  160. }
  161. if !match {
  162. return nil, fmt.Errorf("no matching subnet for gateway %s", g)
  163. }
  164. }
  165. // Validate and add aux-addresses
  166. for key, aa := range auxaddrs {
  167. match := false
  168. for _, s := range subnets {
  169. ok, err := subnetMatches(s, aa)
  170. if err != nil {
  171. return nil, err
  172. }
  173. if !ok {
  174. continue
  175. }
  176. iData[s].AuxAddress[key] = aa
  177. match = true
  178. }
  179. if !match {
  180. return nil, fmt.Errorf("no matching subnet for aux-address %s", aa)
  181. }
  182. }
  183. idl := []network.IPAMConfig{}
  184. for _, v := range iData {
  185. idl = append(idl, *v)
  186. }
  187. return idl, nil
  188. }
  189. func subnetMatches(subnet, data string) (bool, error) {
  190. var (
  191. ip net.IP
  192. )
  193. _, s, err := net.ParseCIDR(subnet)
  194. if err != nil {
  195. return false, fmt.Errorf("Invalid subnet %s : %v", s, err)
  196. }
  197. if strings.Contains(data, "/") {
  198. ip, _, err = net.ParseCIDR(data)
  199. if err != nil {
  200. return false, fmt.Errorf("Invalid cidr %s : %v", data, err)
  201. }
  202. } else {
  203. ip = net.ParseIP(data)
  204. }
  205. return s.Contains(ip), nil
  206. }