123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338 |
- package cluster // import "github.com/docker/docker/daemon/cluster"
- import (
- "context"
- "fmt"
- "github.com/containerd/log"
- apitypes "github.com/docker/docker/api/types"
- "github.com/docker/docker/api/types/filters"
- "github.com/docker/docker/api/types/network"
- types "github.com/docker/docker/api/types/swarm"
- "github.com/docker/docker/daemon/cluster/convert"
- internalnetwork "github.com/docker/docker/daemon/network"
- "github.com/docker/docker/errdefs"
- "github.com/docker/docker/internal/compatcontext"
- "github.com/docker/docker/runconfig"
- swarmapi "github.com/moby/swarmkit/v2/api"
- "github.com/pkg/errors"
- )
- // GetNetworks returns all current cluster managed networks.
- func (c *Cluster) GetNetworks(filter filters.Args) ([]apitypes.NetworkResource, error) {
- var f *swarmapi.ListNetworksRequest_Filters
- if filter.Len() > 0 {
- f = &swarmapi.ListNetworksRequest_Filters{}
- if filter.Contains("name") {
- f.Names = filter.Get("name")
- f.NamePrefixes = filter.Get("name")
- }
- if filter.Contains("id") {
- f.IDPrefixes = filter.Get("id")
- }
- }
- list, err := c.getNetworks(f)
- if err != nil {
- return nil, err
- }
- filterPredefinedNetworks(&list)
- return internalnetwork.FilterNetworks(list, filter)
- }
- func filterPredefinedNetworks(networks *[]apitypes.NetworkResource) {
- if networks == nil {
- return
- }
- var idxs []int
- for i, n := range *networks {
- if v, ok := n.Labels["com.docker.swarm.predefined"]; ok && v == "true" {
- idxs = append(idxs, i)
- }
- }
- for i, idx := range idxs {
- idx -= i
- *networks = append((*networks)[:idx], (*networks)[idx+1:]...)
- }
- }
- func (c *Cluster) getNetworks(filters *swarmapi.ListNetworksRequest_Filters) ([]apitypes.NetworkResource, error) {
- c.mu.RLock()
- defer c.mu.RUnlock()
- state := c.currentNodeState()
- if !state.IsActiveManager() {
- return nil, c.errNoManager(state)
- }
- ctx := context.TODO()
- ctx, cancel := c.getRequestContext(ctx)
- defer cancel()
- r, err := state.controlClient.ListNetworks(ctx, &swarmapi.ListNetworksRequest{Filters: filters})
- if err != nil {
- return nil, err
- }
- networks := make([]apitypes.NetworkResource, 0, len(r.Networks))
- for _, network := range r.Networks {
- networks = append(networks, convert.BasicNetworkFromGRPC(*network))
- }
- return networks, nil
- }
- // GetNetwork returns a cluster network by an ID.
- func (c *Cluster) GetNetwork(input string) (apitypes.NetworkResource, error) {
- var network *swarmapi.Network
- if err := c.lockedManagerAction(func(ctx context.Context, state nodeState) error {
- n, err := getNetwork(ctx, state.controlClient, input)
- if err != nil {
- return err
- }
- network = n
- return nil
- }); err != nil {
- return apitypes.NetworkResource{}, err
- }
- return convert.BasicNetworkFromGRPC(*network), nil
- }
- // GetNetworksByName returns cluster managed networks by name.
- // It is ok to have multiple networks here. #18864
- func (c *Cluster) GetNetworksByName(name string) ([]apitypes.NetworkResource, error) {
- // Note that swarmapi.GetNetworkRequest.Name is not functional.
- // So we cannot just use that with c.GetNetwork.
- return c.getNetworks(&swarmapi.ListNetworksRequest_Filters{
- Names: []string{name},
- })
- }
- func attacherKey(target, containerID string) string {
- return containerID + ":" + target
- }
- // UpdateAttachment signals the attachment config to the attachment
- // waiter who is trying to start or attach the container to the
- // network.
- func (c *Cluster) UpdateAttachment(target, containerID string, config *network.NetworkingConfig) error {
- c.mu.Lock()
- attacher, ok := c.attachers[attacherKey(target, containerID)]
- if !ok || attacher == nil {
- c.mu.Unlock()
- return fmt.Errorf("could not find attacher for container %s to network %s", containerID, target)
- }
- if attacher.inProgress {
- log.G(context.TODO()).Debugf("Discarding redundant notice of resource allocation on network %s for task id %s", target, attacher.taskID)
- c.mu.Unlock()
- return nil
- }
- attacher.inProgress = true
- c.mu.Unlock()
- attacher.attachWaitCh <- config
- return nil
- }
- // WaitForDetachment waits for the container to stop or detach from
- // the network.
- func (c *Cluster) WaitForDetachment(ctx context.Context, networkName, networkID, taskID, containerID string) error {
- c.mu.RLock()
- attacher, ok := c.attachers[attacherKey(networkName, containerID)]
- if !ok {
- attacher, ok = c.attachers[attacherKey(networkID, containerID)]
- }
- state := c.currentNodeState()
- if state.swarmNode == nil || state.swarmNode.Agent() == nil {
- c.mu.RUnlock()
- return errors.New("invalid cluster node while waiting for detachment")
- }
- c.mu.RUnlock()
- agent := state.swarmNode.Agent()
- if ok && attacher != nil &&
- attacher.detachWaitCh != nil &&
- attacher.attachCompleteCh != nil {
- // Attachment may be in progress still so wait for
- // attachment to complete.
- select {
- case <-attacher.attachCompleteCh:
- case <-ctx.Done():
- return ctx.Err()
- }
- if attacher.taskID == taskID {
- select {
- case <-attacher.detachWaitCh:
- case <-ctx.Done():
- return ctx.Err()
- }
- }
- }
- return agent.ResourceAllocator().DetachNetwork(ctx, taskID)
- }
- // AttachNetwork generates an attachment request towards the manager.
- func (c *Cluster) AttachNetwork(target string, containerID string, addresses []string) (*network.NetworkingConfig, error) {
- aKey := attacherKey(target, containerID)
- c.mu.Lock()
- state := c.currentNodeState()
- if state.swarmNode == nil || state.swarmNode.Agent() == nil {
- c.mu.Unlock()
- return nil, errors.New("invalid cluster node while attaching to network")
- }
- if attacher, ok := c.attachers[aKey]; ok {
- c.mu.Unlock()
- return attacher.config, nil
- }
- agent := state.swarmNode.Agent()
- attachWaitCh := make(chan *network.NetworkingConfig)
- detachWaitCh := make(chan struct{})
- attachCompleteCh := make(chan struct{})
- c.attachers[aKey] = &attacher{
- attachWaitCh: attachWaitCh,
- attachCompleteCh: attachCompleteCh,
- detachWaitCh: detachWaitCh,
- }
- c.mu.Unlock()
- ctx := context.TODO()
- ctx, cancel := c.getRequestContext(ctx)
- defer cancel()
- taskID, err := agent.ResourceAllocator().AttachNetwork(ctx, containerID, target, addresses)
- if err != nil {
- c.mu.Lock()
- delete(c.attachers, aKey)
- c.mu.Unlock()
- return nil, fmt.Errorf("Could not attach to network %s: %v", target, err)
- }
- c.mu.Lock()
- c.attachers[aKey].taskID = taskID
- close(attachCompleteCh)
- c.mu.Unlock()
- log.G(ctx).Debugf("Successfully attached to network %s with task id %s", target, taskID)
- release := func() {
- ctx := compatcontext.WithoutCancel(ctx)
- ctx, cancel := c.getRequestContext(ctx)
- defer cancel()
- if err := agent.ResourceAllocator().DetachNetwork(ctx, taskID); err != nil {
- log.G(ctx).Errorf("Failed remove network attachment %s to network %s on allocation failure: %v",
- taskID, target, err)
- }
- }
- var config *network.NetworkingConfig
- select {
- case config = <-attachWaitCh:
- case <-ctx.Done():
- release()
- return nil, fmt.Errorf("attaching to network failed, make sure your network options are correct and check manager logs: %v", ctx.Err())
- }
- c.mu.Lock()
- c.attachers[aKey].config = config
- c.mu.Unlock()
- log.G(ctx).Debugf("Successfully allocated resources on network %s for task id %s", target, taskID)
- return config, nil
- }
- // DetachNetwork unblocks the waiters waiting on WaitForDetachment so
- // that a request to detach can be generated towards the manager.
- func (c *Cluster) DetachNetwork(target string, containerID string) error {
- aKey := attacherKey(target, containerID)
- c.mu.Lock()
- attacher, ok := c.attachers[aKey]
- delete(c.attachers, aKey)
- c.mu.Unlock()
- if !ok {
- return fmt.Errorf("could not find network attachment for container %s to network %s", containerID, target)
- }
- close(attacher.detachWaitCh)
- return nil
- }
- // CreateNetwork creates a new cluster managed network.
- func (c *Cluster) CreateNetwork(s apitypes.NetworkCreateRequest) (string, error) {
- if runconfig.IsPreDefinedNetwork(s.Name) {
- err := notAllowedError(fmt.Sprintf("%s is a pre-defined network and cannot be created", s.Name))
- return "", errors.WithStack(err)
- }
- var resp *swarmapi.CreateNetworkResponse
- if err := c.lockedManagerAction(func(ctx context.Context, state nodeState) error {
- networkSpec := convert.BasicNetworkCreateToGRPC(s)
- r, err := state.controlClient.CreateNetwork(ctx, &swarmapi.CreateNetworkRequest{Spec: &networkSpec})
- if err != nil {
- return err
- }
- resp = r
- return nil
- }); err != nil {
- return "", err
- }
- return resp.Network.ID, nil
- }
- // RemoveNetwork removes a cluster network.
- func (c *Cluster) RemoveNetwork(input string) error {
- return c.lockedManagerAction(func(ctx context.Context, state nodeState) error {
- network, err := getNetwork(ctx, state.controlClient, input)
- if err != nil {
- return err
- }
- _, err = state.controlClient.RemoveNetwork(ctx, &swarmapi.RemoveNetworkRequest{NetworkID: network.ID})
- return err
- })
- }
- func (c *Cluster) populateNetworkID(ctx context.Context, client swarmapi.ControlClient, s *types.ServiceSpec) error {
- // Always prefer NetworkAttachmentConfigs from TaskTemplate
- // but fallback to service spec for backward compatibility
- networks := s.TaskTemplate.Networks
- if len(networks) == 0 {
- networks = s.Networks //nolint:staticcheck // ignore SA1019: field is deprecated.
- }
- for i, n := range networks {
- apiNetwork, err := getNetwork(ctx, client, n.Target)
- if err != nil {
- ln, _ := c.config.Backend.FindNetwork(n.Target)
- if ln != nil && runconfig.IsPreDefinedNetwork(ln.Name()) {
- // Need to retrieve the corresponding predefined swarm network
- // and use its id for the request.
- apiNetwork, err = getNetwork(ctx, client, ln.Name())
- if err != nil {
- return errors.Wrap(errdefs.NotFound(err), "could not find the corresponding predefined swarm network")
- }
- goto setid
- }
- if ln != nil && !ln.Dynamic() {
- errMsg := fmt.Sprintf("The network %s cannot be used with services. Only networks scoped to the swarm can be used, such as those created with the overlay driver.", ln.Name())
- return errors.WithStack(notAllowedError(errMsg))
- }
- return err
- }
- setid:
- networks[i].Target = apiNetwork.ID
- }
- return nil
- }
|