ov_network.go 7.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389
  1. package overlay
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "net"
  6. "sync"
  7. "syscall"
  8. "github.com/Sirupsen/logrus"
  9. "github.com/docker/libnetwork/datastore"
  10. "github.com/docker/libnetwork/driverapi"
  11. "github.com/docker/libnetwork/osl"
  12. "github.com/vishvananda/netlink"
  13. "github.com/vishvananda/netlink/nl"
  14. )
  15. type networkTable map[string]*network
  16. type network struct {
  17. id string
  18. vni uint32
  19. dbIndex uint64
  20. dbExists bool
  21. sbox osl.Sandbox
  22. endpoints endpointTable
  23. vxlanName string
  24. driver *driver
  25. joinCnt int
  26. once *sync.Once
  27. initEpoch int
  28. initErr error
  29. subnets []*net.IPNet
  30. gateways []*net.IPNet
  31. sync.Mutex
  32. }
  33. func (d *driver) CreateNetwork(id string, option map[string]interface{}, ipV4Data, ipV6Data []driverapi.IPAMData) error {
  34. if id == "" {
  35. return fmt.Errorf("invalid network id")
  36. }
  37. if err := d.configure(); err != nil {
  38. return err
  39. }
  40. n := &network{
  41. id: id,
  42. driver: d,
  43. endpoints: endpointTable{},
  44. once: &sync.Once{},
  45. }
  46. n.subnets = make([]*net.IPNet, len(ipV4Data))
  47. n.gateways = make([]*net.IPNet, len(ipV4Data))
  48. for i, ipd := range ipV4Data {
  49. n.subnets[i] = ipd.Pool
  50. n.gateways[i] = ipd.Gateway
  51. }
  52. d.addNetwork(n)
  53. if err := n.obtainVxlanID(); err != nil {
  54. return err
  55. }
  56. return nil
  57. }
  58. func (d *driver) DeleteNetwork(nid string) error {
  59. if nid == "" {
  60. return fmt.Errorf("invalid network id")
  61. }
  62. n := d.network(nid)
  63. if n == nil {
  64. return fmt.Errorf("could not find network with id %s", nid)
  65. }
  66. d.deleteNetwork(nid)
  67. return n.releaseVxlanID()
  68. }
  69. func (n *network) joinSandbox() error {
  70. n.Lock()
  71. if n.joinCnt != 0 {
  72. n.joinCnt++
  73. n.Unlock()
  74. return nil
  75. }
  76. n.Unlock()
  77. // If there is a race between two go routines here only one will win
  78. // the other will wait.
  79. n.once.Do(func() {
  80. // save the error status of initSandbox in n.initErr so that
  81. // all the racing go routines are able to know the status.
  82. n.initErr = n.initSandbox()
  83. })
  84. // Increment joinCnt in all the goroutines only when the one time initSandbox
  85. // was a success.
  86. n.Lock()
  87. if n.initErr == nil {
  88. n.joinCnt++
  89. }
  90. err := n.initErr
  91. n.Unlock()
  92. return err
  93. }
  94. func (n *network) leaveSandbox() {
  95. n.Lock()
  96. n.joinCnt--
  97. if n.joinCnt != 0 {
  98. n.Unlock()
  99. return
  100. }
  101. // We are about to destroy sandbox since the container is leaving the network
  102. // Reinitialize the once variable so that we will be able to trigger one time
  103. // sandbox initialization(again) when another container joins subsequently.
  104. n.once = &sync.Once{}
  105. n.Unlock()
  106. n.destroySandbox()
  107. }
  108. func (n *network) destroySandbox() {
  109. sbox := n.sandbox()
  110. if sbox != nil {
  111. for _, iface := range sbox.Info().Interfaces() {
  112. iface.Remove()
  113. }
  114. if err := deleteVxlan(n.vxlanName); err != nil {
  115. logrus.Warnf("could not cleanup sandbox properly: %v", err)
  116. }
  117. sbox.Destroy()
  118. }
  119. }
  120. func (n *network) initSandbox() error {
  121. n.Lock()
  122. n.initEpoch++
  123. n.Unlock()
  124. sbox, err := osl.NewSandbox(
  125. osl.GenerateKey(fmt.Sprintf("%d-", n.initEpoch)+n.id), true)
  126. if err != nil {
  127. return fmt.Errorf("could not create network sandbox: %v", err)
  128. }
  129. // Add a bridge inside the namespace
  130. if err := sbox.AddInterface("bridge1", "br",
  131. sbox.InterfaceOptions().Address(n.gateways[0]),
  132. sbox.InterfaceOptions().Bridge(true)); err != nil {
  133. return fmt.Errorf("could not create bridge inside the network sandbox: %v", err)
  134. }
  135. n.setSandbox(sbox)
  136. var nlSock *nl.NetlinkSocket
  137. sbox.InvokeFunc(func() {
  138. nlSock, err = nl.Subscribe(syscall.NETLINK_ROUTE, syscall.RTNLGRP_NEIGH)
  139. if err != nil {
  140. err = fmt.Errorf("failed to subscribe to neighbor group netlink messages")
  141. }
  142. })
  143. go n.watchMiss(nlSock)
  144. return n.initVxlan()
  145. }
  146. func (n *network) initVxlan() error {
  147. var vxlanName string
  148. n.Lock()
  149. sbox := n.sbox
  150. n.Unlock()
  151. vxlanName, err := createVxlan(n.vxlanID())
  152. if err != nil {
  153. return err
  154. }
  155. if err = sbox.AddInterface(vxlanName, "vxlan",
  156. sbox.InterfaceOptions().Master("bridge1")); err != nil {
  157. return fmt.Errorf("could not add vxlan interface inside the network sandbox: %v", err)
  158. }
  159. n.vxlanName = vxlanName
  160. n.driver.peerDbUpdateSandbox(n.id)
  161. return nil
  162. }
  163. func (n *network) watchMiss(nlSock *nl.NetlinkSocket) {
  164. for {
  165. msgs, err := nlSock.Receive()
  166. if err != nil {
  167. logrus.Errorf("Failed to receive from netlink: %v ", err)
  168. continue
  169. }
  170. for _, msg := range msgs {
  171. if msg.Header.Type != syscall.RTM_GETNEIGH && msg.Header.Type != syscall.RTM_NEWNEIGH {
  172. continue
  173. }
  174. neigh, err := netlink.NeighDeserialize(msg.Data)
  175. if err != nil {
  176. logrus.Errorf("Failed to deserialize netlink ndmsg: %v", err)
  177. continue
  178. }
  179. if neigh.IP.To16() != nil {
  180. continue
  181. }
  182. if neigh.State&(netlink.NUD_STALE|netlink.NUD_INCOMPLETE) == 0 {
  183. continue
  184. }
  185. mac, vtep, err := n.driver.resolvePeer(n.id, neigh.IP)
  186. if err != nil {
  187. logrus.Errorf("could not resolve peer %q: %v", neigh.IP, err)
  188. continue
  189. }
  190. if err := n.driver.peerAdd(n.id, "dummy", neigh.IP, mac, vtep, true); err != nil {
  191. logrus.Errorf("could not add neighbor entry for missed peer: %v", err)
  192. }
  193. }
  194. }
  195. }
  196. func (d *driver) addNetwork(n *network) {
  197. d.Lock()
  198. d.networks[n.id] = n
  199. d.Unlock()
  200. }
  201. func (d *driver) deleteNetwork(nid string) {
  202. d.Lock()
  203. delete(d.networks, nid)
  204. d.Unlock()
  205. }
  206. func (d *driver) network(nid string) *network {
  207. d.Lock()
  208. defer d.Unlock()
  209. return d.networks[nid]
  210. }
  211. func (n *network) sandbox() osl.Sandbox {
  212. n.Lock()
  213. defer n.Unlock()
  214. return n.sbox
  215. }
  216. func (n *network) setSandbox(sbox osl.Sandbox) {
  217. n.Lock()
  218. n.sbox = sbox
  219. n.Unlock()
  220. }
  221. func (n *network) vxlanID() uint32 {
  222. n.Lock()
  223. defer n.Unlock()
  224. return n.vni
  225. }
  226. func (n *network) setVxlanID(vni uint32) {
  227. n.Lock()
  228. n.vni = vni
  229. n.Unlock()
  230. }
  231. func (n *network) Key() []string {
  232. return []string{"overlay", "network", n.id}
  233. }
  234. func (n *network) KeyPrefix() []string {
  235. return []string{"overlay", "network"}
  236. }
  237. func (n *network) Value() []byte {
  238. b, err := json.Marshal(n.vxlanID())
  239. if err != nil {
  240. return []byte{}
  241. }
  242. return b
  243. }
  244. func (n *network) Index() uint64 {
  245. return n.dbIndex
  246. }
  247. func (n *network) SetIndex(index uint64) {
  248. n.dbIndex = index
  249. n.dbExists = true
  250. }
  251. func (n *network) Exists() bool {
  252. return n.dbExists
  253. }
  254. func (n *network) Skip() bool {
  255. return false
  256. }
  257. func (n *network) SetValue(value []byte) error {
  258. var vni uint32
  259. err := json.Unmarshal(value, &vni)
  260. if err == nil {
  261. n.setVxlanID(vni)
  262. }
  263. return err
  264. }
  265. func (n *network) DataScope() datastore.DataScope {
  266. return datastore.GlobalScope
  267. }
  268. func (n *network) writeToStore() error {
  269. return n.driver.store.PutObjectAtomic(n)
  270. }
  271. func (n *network) releaseVxlanID() error {
  272. if n.driver.store == nil {
  273. return fmt.Errorf("no datastore configured. cannot release vxlan id")
  274. }
  275. if n.vxlanID() == 0 {
  276. return nil
  277. }
  278. if err := n.driver.store.DeleteObjectAtomic(n); err != nil {
  279. if err == datastore.ErrKeyModified || err == datastore.ErrKeyNotFound {
  280. // In both the above cases we can safely assume that the key has been removed by some other
  281. // instance and so simply get out of here
  282. return nil
  283. }
  284. return fmt.Errorf("failed to delete network to vxlan id map: %v", err)
  285. }
  286. n.driver.vxlanIdm.Release(n.vxlanID())
  287. n.setVxlanID(0)
  288. return nil
  289. }
  290. func (n *network) obtainVxlanID() error {
  291. if n.driver.store == nil {
  292. return fmt.Errorf("no datastore configured. cannot obtain vxlan id")
  293. }
  294. for {
  295. var vxlanID uint32
  296. if err := n.driver.store.GetObject(datastore.Key(n.Key()...), n); err != nil {
  297. if err == datastore.ErrKeyNotFound {
  298. vxlanID, err = n.driver.vxlanIdm.GetID()
  299. if err != nil {
  300. return fmt.Errorf("failed to allocate vxlan id: %v", err)
  301. }
  302. n.setVxlanID(vxlanID)
  303. if err := n.writeToStore(); err != nil {
  304. n.driver.vxlanIdm.Release(n.vxlanID())
  305. n.setVxlanID(0)
  306. if err == datastore.ErrKeyModified {
  307. continue
  308. }
  309. return fmt.Errorf("failed to update data store with vxlan id: %v", err)
  310. }
  311. return nil
  312. }
  313. return fmt.Errorf("failed to obtain vxlan id from data store: %v", err)
  314. }
  315. return nil
  316. }
  317. }