2015-04-30 01:25:01 +00:00
|
|
|
/*
|
|
|
|
Package libnetwork provides the basic functionality and extension points to
|
|
|
|
create network namespaces and allocate interfaces for containers to use.
|
|
|
|
|
2015-06-16 02:09:59 +00:00
|
|
|
networkType := "bridge"
|
|
|
|
|
2015-09-22 15:27:11 +00:00
|
|
|
// Create a new controller instance
|
2015-06-16 02:09:59 +00:00
|
|
|
driverOptions := options.Generic{}
|
|
|
|
genericOption := make(map[string]interface{})
|
|
|
|
genericOption[netlabel.GenericData] = driverOptions
|
2015-09-22 15:27:11 +00:00
|
|
|
controller, err := libnetwork.New(config.OptionDriverConfig(networkType, genericOption))
|
2015-06-16 02:09:59 +00:00
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a network for containers to join.
|
2015-08-25 16:41:32 +00:00
|
|
|
// NewNetwork accepts Variadic optional arguments that libnetwork and Drivers can make use of
|
2016-02-29 19:49:04 +00:00
|
|
|
network, err := controller.NewNetwork(networkType, "network1", "")
|
2015-06-16 02:09:59 +00:00
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// For each new container: allocate IP and interfaces. The returned network
|
|
|
|
// settings will be used for container infos (inspect and such), as well as
|
|
|
|
// iptables rules for port publishing. This info is contained or accessible
|
|
|
|
// from the returned endpoint.
|
|
|
|
ep, err := network.CreateEndpoint("Endpoint1")
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2015-09-22 15:27:11 +00:00
|
|
|
// Create the sandbox for the container.
|
|
|
|
// NewSandbox accepts Variadic optional arguments which libnetwork can use.
|
|
|
|
sbx, err := controller.NewSandbox("container1",
|
|
|
|
libnetwork.OptionHostname("test"),
|
|
|
|
libnetwork.OptionDomainname("docker.io"))
|
|
|
|
|
|
|
|
// A sandbox can join the endpoint via the join api.
|
|
|
|
err = ep.Join(sbx)
|
2015-06-16 02:09:59 +00:00
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
2015-04-30 01:25:01 +00:00
|
|
|
*/
|
|
|
|
package libnetwork
|
|
|
|
|
|
|
|
import (
|
2015-07-02 05:00:48 +00:00
|
|
|
"container/heap"
|
2015-05-15 22:23:59 +00:00
|
|
|
"fmt"
|
|
|
|
"net"
|
2015-09-18 19:54:08 +00:00
|
|
|
"strings"
|
2015-04-30 01:25:01 +00:00
|
|
|
"sync"
|
2016-09-20 15:59:32 +00:00
|
|
|
"time"
|
2015-04-30 01:25:01 +00:00
|
|
|
|
2016-11-01 04:26:14 +00:00
|
|
|
"github.com/Sirupsen/logrus"
|
2015-09-18 19:54:08 +00:00
|
|
|
"github.com/docker/docker/pkg/discovery"
|
2016-09-12 22:19:22 +00:00
|
|
|
"github.com/docker/docker/pkg/locker"
|
2016-10-07 18:58:10 +00:00
|
|
|
"github.com/docker/docker/pkg/plugingetter"
|
2015-05-16 01:14:36 +00:00
|
|
|
"github.com/docker/docker/pkg/plugins"
|
2015-04-30 01:25:01 +00:00
|
|
|
"github.com/docker/docker/pkg/stringid"
|
2016-05-24 23:17:19 +00:00
|
|
|
"github.com/docker/libnetwork/cluster"
|
2015-05-23 04:52:02 +00:00
|
|
|
"github.com/docker/libnetwork/config"
|
2015-05-08 13:26:35 +00:00
|
|
|
"github.com/docker/libnetwork/datastore"
|
2016-01-28 19:54:03 +00:00
|
|
|
"github.com/docker/libnetwork/discoverapi"
|
2015-05-06 23:57:38 +00:00
|
|
|
"github.com/docker/libnetwork/driverapi"
|
2016-03-01 02:17:04 +00:00
|
|
|
"github.com/docker/libnetwork/drvregistry"
|
2015-05-15 22:23:59 +00:00
|
|
|
"github.com/docker/libnetwork/hostdiscovery"
|
2015-09-22 20:20:55 +00:00
|
|
|
"github.com/docker/libnetwork/ipamapi"
|
2015-10-13 17:37:53 +00:00
|
|
|
"github.com/docker/libnetwork/netlabel"
|
2015-07-02 05:00:48 +00:00
|
|
|
"github.com/docker/libnetwork/osl"
|
2015-04-30 01:25:01 +00:00
|
|
|
"github.com/docker/libnetwork/types"
|
|
|
|
)
|
|
|
|
|
|
|
|
// NetworkController provides the interface for controller instance which manages
|
|
|
|
// networks.
|
|
|
|
type NetworkController interface {
|
2016-05-23 02:55:17 +00:00
|
|
|
// ID provides a unique identity for the controller
|
2015-09-09 21:24:05 +00:00
|
|
|
ID() string
|
|
|
|
|
2016-06-30 12:48:14 +00:00
|
|
|
// BuiltinDrivers returns list of builtin drivers
|
|
|
|
BuiltinDrivers() []string
|
|
|
|
|
2016-12-19 03:56:34 +00:00
|
|
|
// BuiltinIPAMDrivers returns list of builtin ipam drivers
|
|
|
|
BuiltinIPAMDrivers() []string
|
|
|
|
|
2015-06-11 13:52:46 +00:00
|
|
|
// Config method returns the bootup configuration for the controller
|
|
|
|
Config() config.Config
|
|
|
|
|
2015-04-30 01:25:01 +00:00
|
|
|
// Create a new network. The options parameter carries network specific options.
|
2016-02-29 19:49:04 +00:00
|
|
|
NewNetwork(networkType, name string, id string, options ...NetworkOption) (Network, error)
|
2015-04-30 01:25:01 +00:00
|
|
|
|
|
|
|
// Networks returns the list of Network(s) managed by this controller.
|
|
|
|
Networks() []Network
|
|
|
|
|
|
|
|
// WalkNetworks uses the provided function to walk the Network(s) managed by this controller.
|
|
|
|
WalkNetworks(walker NetworkWalker)
|
|
|
|
|
2015-05-15 23:04:09 +00:00
|
|
|
// NetworkByName returns the Network which has the passed name. If not found, the error ErrNoSuchNetwork is returned.
|
2015-05-11 23:13:27 +00:00
|
|
|
NetworkByName(name string) (Network, error)
|
2015-04-30 01:25:01 +00:00
|
|
|
|
2015-05-15 23:04:09 +00:00
|
|
|
// NetworkByID returns the Network which has the passed id. If not found, the error ErrNoSuchNetwork is returned.
|
2015-05-11 23:13:27 +00:00
|
|
|
NetworkByID(id string) (Network, error)
|
2015-06-05 18:46:33 +00:00
|
|
|
|
2016-05-23 02:55:17 +00:00
|
|
|
// NewSandbox creates a new network sandbox for the passed container id
|
2015-07-02 05:00:48 +00:00
|
|
|
NewSandbox(containerID string, options ...SandboxOption) (Sandbox, error)
|
|
|
|
|
|
|
|
// Sandboxes returns the list of Sandbox(s) managed by this controller.
|
|
|
|
Sandboxes() []Sandbox
|
|
|
|
|
2016-07-29 18:21:10 +00:00
|
|
|
// WalkSandboxes uses the provided function to walk the Sandbox(s) managed by this controller.
|
2015-07-02 05:00:48 +00:00
|
|
|
WalkSandboxes(walker SandboxWalker)
|
|
|
|
|
|
|
|
// SandboxByID returns the Sandbox which has the passed id. If not found, a types.NotFoundError is returned.
|
|
|
|
SandboxByID(id string) (Sandbox, error)
|
2015-06-20 01:41:31 +00:00
|
|
|
|
2015-11-02 07:03:26 +00:00
|
|
|
// SandboxDestroy destroys a sandbox given a container ID
|
|
|
|
SandboxDestroy(id string) error
|
|
|
|
|
2015-09-09 21:24:05 +00:00
|
|
|
// Stop network controller
|
|
|
|
Stop()
|
2016-02-16 23:19:18 +00:00
|
|
|
|
|
|
|
// ReloadCondfiguration updates the controller configuration
|
|
|
|
ReloadConfiguration(cfgOptions ...config.Option) error
|
2016-05-24 23:17:19 +00:00
|
|
|
|
|
|
|
// SetClusterProvider sets cluster provider
|
|
|
|
SetClusterProvider(provider cluster.Provider)
|
2016-06-06 02:37:13 +00:00
|
|
|
|
|
|
|
// Wait for agent initialization complete in libnetwork controller
|
|
|
|
AgentInitWait()
|
2016-06-05 05:48:10 +00:00
|
|
|
|
|
|
|
// SetKeys configures the encryption key for gossip and overlay data path
|
|
|
|
SetKeys(keys []*types.EncryptionKey) error
|
2015-04-30 01:25:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// NetworkWalker is a client provided function which will be used to walk the Networks.
|
|
|
|
// When the function returns true, the walk will stop.
|
|
|
|
type NetworkWalker func(nw Network) bool
|
|
|
|
|
2015-07-02 05:00:48 +00:00
|
|
|
// SandboxWalker is a client provided function which will be used to walk the Sandboxes.
|
|
|
|
// When the function returns true, the walk will stop.
|
|
|
|
type SandboxWalker func(sb Sandbox) bool
|
|
|
|
|
|
|
|
type sandboxTable map[string]*sandbox
|
2015-04-30 01:25:01 +00:00
|
|
|
|
|
|
|
type controller struct {
|
2016-06-05 05:48:10 +00:00
|
|
|
id string
|
|
|
|
drvRegistry *drvregistry.DrvRegistry
|
|
|
|
sandboxes sandboxTable
|
|
|
|
cfg *config.Config
|
|
|
|
stores []datastore.DataStore
|
|
|
|
discovery hostdiscovery.HostDiscovery
|
|
|
|
extKeyListener net.Listener
|
|
|
|
watchCh chan *endpoint
|
|
|
|
unWatchCh chan *endpoint
|
|
|
|
svcRecords map[string]svcInfo
|
|
|
|
nmap map[string]*netWatch
|
2016-06-24 23:37:14 +00:00
|
|
|
serviceBindings map[serviceKey]*service
|
2016-06-05 05:48:10 +00:00
|
|
|
defOsSbox osl.Sandbox
|
|
|
|
ingressSandbox *sandbox
|
|
|
|
sboxOnce sync.Once
|
|
|
|
agent *agent
|
2016-09-12 22:19:22 +00:00
|
|
|
networkLocker *locker.Locker
|
2016-06-05 05:48:10 +00:00
|
|
|
agentInitDone chan struct{}
|
|
|
|
keys []*types.EncryptionKey
|
|
|
|
clusterConfigAvailable bool
|
2015-04-30 01:25:01 +00:00
|
|
|
sync.Mutex
|
|
|
|
}
|
|
|
|
|
2016-03-01 02:17:04 +00:00
|
|
|
type initializer struct {
|
|
|
|
fn drvregistry.InitFunc
|
|
|
|
ntype string
|
|
|
|
}
|
|
|
|
|
2015-04-30 01:25:01 +00:00
|
|
|
// New creates a new instance of network controller.
|
2015-06-11 13:52:46 +00:00
|
|
|
func New(cfgOptions ...config.Option) (NetworkController, error) {
|
Make driver packages register themselves via DriverCallback
In the present code, each driver package provides a `New()` method
which constructs a driver of its type, which is then registered with
the controller.
However, this is not suitable for the `drivers/remote` package, since
it does not provide a (singleton) driver, but a mechanism for drivers
to be added dynamically. As a result, the implementation is oddly
dual-purpose, and a spurious `"remote"` driver is added to the
controller's list of available drivers.
Instead, it is better to provide the registration callback to each
package and let it register its own driver or drivers. That way, the
singleton driver packages can construct one and register it, and the
remote package can hook the callback up with whatever the dynamic
driver mechanism turns out to be.
NB there are some method signature changes; in particular to
controller.New, which can return an error if the built-in driver
packages fail to initialise.
Signed-off-by: Michael Bridgen <mikeb@squaremobius.net>
2015-05-11 12:46:29 +00:00
|
|
|
c := &controller{
|
2016-04-14 00:53:41 +00:00
|
|
|
id: stringid.GenerateRandomID(),
|
|
|
|
cfg: config.ParseConfigOptions(cfgOptions...),
|
|
|
|
sandboxes: sandboxTable{},
|
|
|
|
svcRecords: make(map[string]svcInfo),
|
2016-06-24 23:37:14 +00:00
|
|
|
serviceBindings: make(map[serviceKey]*service),
|
2016-06-06 02:37:13 +00:00
|
|
|
agentInitDone: make(chan struct{}),
|
2016-09-12 22:19:22 +00:00
|
|
|
networkLocker: locker.New(),
|
Make driver packages register themselves via DriverCallback
In the present code, each driver package provides a `New()` method
which constructs a driver of its type, which is then registered with
the controller.
However, this is not suitable for the `drivers/remote` package, since
it does not provide a (singleton) driver, but a mechanism for drivers
to be added dynamically. As a result, the implementation is oddly
dual-purpose, and a spurious `"remote"` driver is added to the
controller's list of available drivers.
Instead, it is better to provide the registration callback to each
package and let it register its own driver or drivers. That way, the
singleton driver packages can construct one and register it, and the
remote package can hook the callback up with whatever the dynamic
driver mechanism turns out to be.
NB there are some method signature changes; in particular to
controller.New, which can return an error if the built-in driver
packages fail to initialise.
Signed-off-by: Michael Bridgen <mikeb@squaremobius.net>
2015-05-11 12:46:29 +00:00
|
|
|
}
|
2015-05-08 13:26:35 +00:00
|
|
|
|
2015-10-05 11:21:15 +00:00
|
|
|
if err := c.initStores(); err != nil {
|
2015-09-22 20:20:55 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2016-09-27 20:54:25 +00:00
|
|
|
drvRegistry, err := drvregistry.New(c.getStore(datastore.LocalScope), c.getStore(datastore.GlobalScope), c.RegisterDriver, nil, c.cfg.PluginGetter)
|
2016-03-01 02:17:04 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2016-12-13 21:22:55 +00:00
|
|
|
for _, i := range getInitializers(c.cfg.Daemon.Experimental) {
|
2016-03-01 02:17:04 +00:00
|
|
|
var dcfg map[string]interface{}
|
|
|
|
|
|
|
|
// External plugins don't need config passed through daemon. They can
|
|
|
|
// bootstrap themselves
|
|
|
|
if i.ntype != "remote" {
|
|
|
|
dcfg = c.makeDriverConfig(i.ntype)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := drvRegistry.AddDriver(i.ntype, i.fn, dcfg); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
2016-07-05 20:49:31 +00:00
|
|
|
|
|
|
|
if err = initIPAMDrivers(drvRegistry, nil, c.getStore(datastore.GlobalScope)); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2016-03-01 02:17:04 +00:00
|
|
|
c.drvRegistry = drvRegistry
|
|
|
|
|
2016-02-16 23:19:18 +00:00
|
|
|
if c.cfg != nil && c.cfg.Cluster.Watcher != nil {
|
|
|
|
if err := c.initDiscovery(c.cfg.Cluster.Watcher); err != nil {
|
2016-02-23 21:44:38 +00:00
|
|
|
// Failing to initialize discovery is a bad situation to be in.
|
2015-05-15 22:23:59 +00:00
|
|
|
// But it cannot fail creating the Controller
|
2016-11-01 04:26:14 +00:00
|
|
|
logrus.Errorf("Failed to Initialize Discovery : %v", err)
|
2015-05-15 22:23:59 +00:00
|
|
|
}
|
2015-10-05 11:21:15 +00:00
|
|
|
}
|
|
|
|
|
2016-06-15 04:34:44 +00:00
|
|
|
c.WalkNetworks(populateSpecial)
|
|
|
|
|
2016-06-11 00:32:19 +00:00
|
|
|
// Reserve pools first before doing cleanup. Otherwise the
|
|
|
|
// cleanups of endpoint/network and sandbox below will
|
|
|
|
// generate many unnecessary warnings
|
2016-06-12 02:19:16 +00:00
|
|
|
c.reservePools()
|
|
|
|
|
|
|
|
// Cleanup resources
|
2016-06-11 00:32:19 +00:00
|
|
|
c.sandboxCleanup(c.cfg.ActiveSandboxes)
|
2015-10-19 20:20:23 +00:00
|
|
|
c.cleanupLocalEndpoints()
|
2016-03-05 10:00:31 +00:00
|
|
|
c.networkCleanup()
|
2015-10-08 03:01:38 +00:00
|
|
|
|
2015-09-09 21:24:05 +00:00
|
|
|
if err := c.startExternalKeyListener(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2015-05-13 15:41:45 +00:00
|
|
|
return c, nil
|
|
|
|
}
|
|
|
|
|
2016-05-24 23:17:19 +00:00
|
|
|
func (c *controller) SetClusterProvider(provider cluster.Provider) {
|
2016-06-10 04:38:29 +00:00
|
|
|
c.Lock()
|
2016-05-24 23:17:19 +00:00
|
|
|
c.cfg.Daemon.ClusterProvider = provider
|
2016-11-22 07:38:03 +00:00
|
|
|
disableProviderCh := c.cfg.Daemon.DisableProvider
|
|
|
|
c.Unlock()
|
2016-06-10 04:38:29 +00:00
|
|
|
if provider != nil {
|
|
|
|
go c.clusterAgentInit()
|
|
|
|
} else {
|
2016-11-22 07:38:03 +00:00
|
|
|
disableProviderCh <- struct{}{}
|
2016-06-10 04:38:29 +00:00
|
|
|
}
|
2016-05-24 23:17:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func isValidClusteringIP(addr string) bool {
|
|
|
|
return addr != "" && !net.ParseIP(addr).IsLoopback() && !net.ParseIP(addr).IsUnspecified()
|
|
|
|
}
|
|
|
|
|
2016-06-05 05:48:10 +00:00
|
|
|
// libnetwork side of agent depends on the keys. On the first receipt of
|
|
|
|
// keys setup the agent. For subsequent key set handle the key change
|
|
|
|
func (c *controller) SetKeys(keys []*types.EncryptionKey) error {
|
2016-06-10 04:38:29 +00:00
|
|
|
c.Lock()
|
|
|
|
existingKeys := c.keys
|
|
|
|
clusterConfigAvailable := c.clusterConfigAvailable
|
|
|
|
agent := c.agent
|
|
|
|
c.Unlock()
|
2016-08-04 00:58:24 +00:00
|
|
|
|
|
|
|
subsysKeys := make(map[string]int)
|
|
|
|
for _, key := range keys {
|
|
|
|
if key.Subsystem != subsysGossip &&
|
|
|
|
key.Subsystem != subsysIPSec {
|
|
|
|
return fmt.Errorf("key received for unrecognized subsystem")
|
|
|
|
}
|
|
|
|
subsysKeys[key.Subsystem]++
|
|
|
|
}
|
|
|
|
for s, count := range subsysKeys {
|
|
|
|
if count != keyringSize {
|
2016-12-27 11:42:32 +00:00
|
|
|
return fmt.Errorf("incorrect number of keys for subsystem %v", s)
|
2016-08-04 00:58:24 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-06-10 04:38:29 +00:00
|
|
|
if len(existingKeys) == 0 {
|
|
|
|
c.Lock()
|
2016-06-05 05:48:10 +00:00
|
|
|
c.keys = keys
|
2016-06-10 04:38:29 +00:00
|
|
|
c.Unlock()
|
|
|
|
if agent != nil {
|
2016-06-05 05:48:10 +00:00
|
|
|
return (fmt.Errorf("libnetwork agent setup without keys"))
|
|
|
|
}
|
2016-06-10 04:38:29 +00:00
|
|
|
if clusterConfigAvailable {
|
2016-06-05 05:48:10 +00:00
|
|
|
return c.agentSetup()
|
|
|
|
}
|
2016-11-01 04:26:14 +00:00
|
|
|
logrus.Debug("received encryption keys before cluster config")
|
2016-06-05 05:48:10 +00:00
|
|
|
return nil
|
|
|
|
}
|
2016-06-10 04:38:29 +00:00
|
|
|
if agent == nil {
|
|
|
|
c.Lock()
|
2016-06-05 05:48:10 +00:00
|
|
|
c.keys = keys
|
2016-06-10 04:38:29 +00:00
|
|
|
c.Unlock()
|
2016-06-05 05:48:10 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return c.handleKeyChange(keys)
|
|
|
|
}
|
|
|
|
|
2016-11-22 07:38:03 +00:00
|
|
|
func (c *controller) getAgent() *agent {
|
|
|
|
c.Lock()
|
|
|
|
defer c.Unlock()
|
|
|
|
return c.agent
|
|
|
|
}
|
|
|
|
|
2016-05-24 23:17:19 +00:00
|
|
|
func (c *controller) clusterAgentInit() {
|
|
|
|
clusterProvider := c.cfg.Daemon.ClusterProvider
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-clusterProvider.ListenClusterEvents():
|
|
|
|
if !c.isDistributedControl() {
|
2016-06-10 04:38:29 +00:00
|
|
|
c.Lock()
|
|
|
|
c.clusterConfigAvailable = true
|
|
|
|
keys := c.keys
|
|
|
|
c.Unlock()
|
2016-11-28 18:44:45 +00:00
|
|
|
// agent initialization needs encryption keys and bind/remote IP which
|
2016-06-05 05:48:10 +00:00
|
|
|
// comes from the daemon cluster events
|
2016-06-10 04:38:29 +00:00
|
|
|
if len(keys) > 0 {
|
2016-06-05 05:48:10 +00:00
|
|
|
c.agentSetup()
|
2016-05-24 23:17:19 +00:00
|
|
|
}
|
|
|
|
}
|
2016-06-10 04:38:29 +00:00
|
|
|
case <-c.cfg.Daemon.DisableProvider:
|
|
|
|
c.Lock()
|
|
|
|
c.clusterConfigAvailable = false
|
|
|
|
c.agentInitDone = make(chan struct{})
|
2016-08-17 00:37:33 +00:00
|
|
|
c.keys = nil
|
2016-06-10 04:38:29 +00:00
|
|
|
c.Unlock()
|
2016-08-17 20:48:51 +00:00
|
|
|
|
2016-08-20 00:50:37 +00:00
|
|
|
// We are leaving the cluster. Make sure we
|
|
|
|
// close the gossip so that we stop all
|
|
|
|
// incoming gossip updates before cleaning up
|
|
|
|
// any remaining service bindings. But before
|
|
|
|
// deleting the networks since the networks
|
|
|
|
// should still be present when cleaning up
|
|
|
|
// service bindings
|
|
|
|
c.agentClose()
|
|
|
|
c.cleanupServiceBindings("")
|
|
|
|
|
2016-09-29 22:01:44 +00:00
|
|
|
c.clearIngress(true)
|
2016-08-17 20:48:51 +00:00
|
|
|
|
2016-06-10 04:38:29 +00:00
|
|
|
return
|
2016-05-24 23:17:19 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-06-06 02:37:13 +00:00
|
|
|
// AgentInitWait waits for agent initialization to be completed in the
|
|
|
|
// controller.
|
|
|
|
func (c *controller) AgentInitWait() {
|
2016-08-24 16:51:02 +00:00
|
|
|
c.Lock()
|
|
|
|
agentInitDone := c.agentInitDone
|
|
|
|
c.Unlock()
|
|
|
|
|
|
|
|
if agentInitDone != nil {
|
|
|
|
<-agentInitDone
|
|
|
|
}
|
2016-06-06 02:37:13 +00:00
|
|
|
}
|
|
|
|
|
2016-03-01 02:17:04 +00:00
|
|
|
func (c *controller) makeDriverConfig(ntype string) map[string]interface{} {
|
|
|
|
if c.cfg == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
config := make(map[string]interface{})
|
|
|
|
|
|
|
|
for _, label := range c.cfg.Daemon.Labels {
|
|
|
|
if !strings.HasPrefix(netlabel.Key(label), netlabel.DriverPrefix+"."+ntype) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
config[netlabel.Key(label)] = netlabel.Value(label)
|
|
|
|
}
|
|
|
|
|
|
|
|
drvCfg, ok := c.cfg.Daemon.DriverCfg[ntype]
|
|
|
|
if ok {
|
|
|
|
for k, v := range drvCfg.(map[string]interface{}) {
|
|
|
|
config[k] = v
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for k, v := range c.cfg.Scopes {
|
|
|
|
if !v.IsValid() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
config[netlabel.MakeKVClient(k)] = discoverapi.DatastoreConfigData{
|
|
|
|
Scope: k,
|
|
|
|
Provider: v.Client.Provider,
|
|
|
|
Address: v.Client.Address,
|
|
|
|
Config: v.Client.Config,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return config
|
|
|
|
}
|
|
|
|
|
2016-02-16 23:19:18 +00:00
|
|
|
var procReloadConfig = make(chan (bool), 1)
|
|
|
|
|
|
|
|
func (c *controller) ReloadConfiguration(cfgOptions ...config.Option) error {
|
|
|
|
procReloadConfig <- true
|
|
|
|
defer func() { <-procReloadConfig }()
|
|
|
|
|
|
|
|
// For now we accept the configuration reload only as a mean to provide a global store config after boot.
|
|
|
|
// Refuse the configuration if it alters an existing datastore client configuration.
|
|
|
|
update := false
|
|
|
|
cfg := config.ParseConfigOptions(cfgOptions...)
|
2016-03-30 21:42:58 +00:00
|
|
|
|
2016-02-16 23:19:18 +00:00
|
|
|
for s := range c.cfg.Scopes {
|
|
|
|
if _, ok := cfg.Scopes[s]; !ok {
|
|
|
|
return types.ForbiddenErrorf("cannot accept new configuration because it removes an existing datastore client")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for s, nSCfg := range cfg.Scopes {
|
|
|
|
if eSCfg, ok := c.cfg.Scopes[s]; ok {
|
|
|
|
if eSCfg.Client.Provider != nSCfg.Client.Provider ||
|
|
|
|
eSCfg.Client.Address != nSCfg.Client.Address {
|
|
|
|
return types.ForbiddenErrorf("cannot accept new configuration because it modifies an existing datastore client")
|
|
|
|
}
|
|
|
|
} else {
|
2016-03-25 08:10:03 +00:00
|
|
|
if err := c.initScopedStore(s, nSCfg); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-02-16 23:19:18 +00:00
|
|
|
update = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !update {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-07-21 19:09:07 +00:00
|
|
|
c.Lock()
|
|
|
|
c.cfg = cfg
|
|
|
|
c.Unlock()
|
|
|
|
|
2016-02-16 23:19:18 +00:00
|
|
|
var dsConfig *discoverapi.DatastoreConfigData
|
|
|
|
for scope, sCfg := range cfg.Scopes {
|
|
|
|
if scope == datastore.LocalScope || !sCfg.IsValid() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
dsConfig = &discoverapi.DatastoreConfigData{
|
|
|
|
Scope: scope,
|
|
|
|
Provider: sCfg.Client.Provider,
|
|
|
|
Address: sCfg.Client.Address,
|
|
|
|
Config: sCfg.Client.Config,
|
|
|
|
}
|
|
|
|
break
|
|
|
|
}
|
|
|
|
if dsConfig == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-03-01 02:17:04 +00:00
|
|
|
c.drvRegistry.WalkIPAMs(func(name string, driver ipamapi.Ipam, cap *ipamapi.Capability) bool {
|
|
|
|
err := driver.DiscoverNew(discoverapi.DatastoreConfig, *dsConfig)
|
2016-02-16 23:19:18 +00:00
|
|
|
if err != nil {
|
2016-11-01 04:26:14 +00:00
|
|
|
logrus.Errorf("Failed to set datastore in driver %s: %v", name, err)
|
2016-02-16 23:19:18 +00:00
|
|
|
}
|
2016-03-01 02:17:04 +00:00
|
|
|
return false
|
|
|
|
})
|
2016-02-16 23:19:18 +00:00
|
|
|
|
2016-03-01 02:17:04 +00:00
|
|
|
c.drvRegistry.WalkDrivers(func(name string, driver driverapi.Driver, capability driverapi.Capability) bool {
|
|
|
|
err := driver.DiscoverNew(discoverapi.DatastoreConfig, *dsConfig)
|
2016-02-16 23:19:18 +00:00
|
|
|
if err != nil {
|
2016-11-01 04:26:14 +00:00
|
|
|
logrus.Errorf("Failed to set datastore in driver %s: %v", name, err)
|
2016-02-16 23:19:18 +00:00
|
|
|
}
|
2016-03-01 02:17:04 +00:00
|
|
|
return false
|
|
|
|
})
|
2016-02-16 23:19:18 +00:00
|
|
|
|
2016-03-30 21:42:58 +00:00
|
|
|
if c.discovery == nil && c.cfg.Cluster.Watcher != nil {
|
|
|
|
if err := c.initDiscovery(c.cfg.Cluster.Watcher); err != nil {
|
2016-11-01 04:26:14 +00:00
|
|
|
logrus.Errorf("Failed to Initialize Discovery after configuration update: %v", err)
|
2016-03-30 21:42:58 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-02-16 23:19:18 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-09-09 21:24:05 +00:00
|
|
|
func (c *controller) ID() string {
|
|
|
|
return c.id
|
|
|
|
}
|
|
|
|
|
2016-06-30 12:48:14 +00:00
|
|
|
func (c *controller) BuiltinDrivers() []string {
|
|
|
|
drivers := []string{}
|
2016-12-19 03:56:34 +00:00
|
|
|
c.drvRegistry.WalkDrivers(func(name string, driver driverapi.Driver, capability driverapi.Capability) bool {
|
|
|
|
if driver.IsBuiltIn() {
|
|
|
|
drivers = append(drivers, name)
|
2016-06-30 12:48:14 +00:00
|
|
|
}
|
2016-12-19 03:56:34 +00:00
|
|
|
return false
|
|
|
|
})
|
|
|
|
return drivers
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *controller) BuiltinIPAMDrivers() []string {
|
|
|
|
drivers := []string{}
|
|
|
|
c.drvRegistry.WalkIPAMs(func(name string, driver ipamapi.Ipam, cap *ipamapi.Capability) bool {
|
|
|
|
if driver.IsBuiltIn() {
|
|
|
|
drivers = append(drivers, name)
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
})
|
2016-06-30 12:48:14 +00:00
|
|
|
return drivers
|
|
|
|
}
|
|
|
|
|
2015-06-11 13:52:46 +00:00
|
|
|
func (c *controller) validateHostDiscoveryConfig() bool {
|
|
|
|
if c.cfg == nil || c.cfg.Cluster.Discovery == "" || c.cfg.Cluster.Address == "" {
|
|
|
|
return false
|
2015-05-23 04:52:02 +00:00
|
|
|
}
|
2015-06-11 13:52:46 +00:00
|
|
|
return true
|
2015-05-23 04:52:02 +00:00
|
|
|
}
|
2015-05-08 13:26:35 +00:00
|
|
|
|
2016-01-08 19:24:14 +00:00
|
|
|
func (c *controller) clusterHostID() string {
|
|
|
|
c.Lock()
|
|
|
|
defer c.Unlock()
|
|
|
|
if c.cfg == nil || c.cfg.Cluster.Address == "" {
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
addr := strings.Split(c.cfg.Cluster.Address, ":")
|
|
|
|
return addr[0]
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *controller) isNodeAlive(node string) bool {
|
|
|
|
if c.discovery == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
nodes := c.discovery.Fetch()
|
|
|
|
for _, n := range nodes {
|
|
|
|
if n.String() == node {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2015-09-18 19:54:08 +00:00
|
|
|
func (c *controller) initDiscovery(watcher discovery.Watcher) error {
|
2015-05-15 22:23:59 +00:00
|
|
|
if c.cfg == nil {
|
|
|
|
return fmt.Errorf("discovery initialization requires a valid configuration")
|
|
|
|
}
|
|
|
|
|
2015-09-18 19:54:08 +00:00
|
|
|
c.discovery = hostdiscovery.NewHostDiscovery(watcher)
|
2015-10-22 04:31:43 +00:00
|
|
|
return c.discovery.Watch(c.activeCallback, c.hostJoinCallback, c.hostLeaveCallback)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *controller) activeCallback() {
|
|
|
|
ds := c.getStore(datastore.GlobalScope)
|
|
|
|
if ds != nil && !ds.Active() {
|
|
|
|
ds.RestartWatch()
|
|
|
|
}
|
2015-05-15 22:23:59 +00:00
|
|
|
}
|
|
|
|
|
2015-09-18 19:54:08 +00:00
|
|
|
func (c *controller) hostJoinCallback(nodes []net.IP) {
|
|
|
|
c.processNodeDiscovery(nodes, true)
|
2015-05-15 22:23:59 +00:00
|
|
|
}
|
|
|
|
|
2015-09-18 19:54:08 +00:00
|
|
|
func (c *controller) hostLeaveCallback(nodes []net.IP) {
|
|
|
|
c.processNodeDiscovery(nodes, false)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *controller) processNodeDiscovery(nodes []net.IP, add bool) {
|
2016-03-01 02:17:04 +00:00
|
|
|
c.drvRegistry.WalkDrivers(func(name string, driver driverapi.Driver, capability driverapi.Capability) bool {
|
|
|
|
c.pushNodeDiscovery(driver, capability, nodes, add)
|
|
|
|
return false
|
|
|
|
})
|
2015-09-18 19:54:08 +00:00
|
|
|
}
|
|
|
|
|
2016-03-01 02:17:04 +00:00
|
|
|
func (c *controller) pushNodeDiscovery(d driverapi.Driver, cap driverapi.Capability, nodes []net.IP, add bool) {
|
2015-09-18 19:54:08 +00:00
|
|
|
var self net.IP
|
|
|
|
if c.cfg != nil {
|
|
|
|
addr := strings.Split(c.cfg.Cluster.Address, ":")
|
|
|
|
self = net.ParseIP(addr[0])
|
|
|
|
}
|
2016-03-01 02:17:04 +00:00
|
|
|
|
|
|
|
if d == nil || cap.DataScope != datastore.GlobalScope || nodes == nil {
|
2015-09-18 19:54:08 +00:00
|
|
|
return
|
|
|
|
}
|
2016-03-01 02:17:04 +00:00
|
|
|
|
2015-09-18 19:54:08 +00:00
|
|
|
for _, node := range nodes {
|
2016-01-28 19:54:03 +00:00
|
|
|
nodeData := discoverapi.NodeDiscoveryData{Address: node.String(), Self: node.Equal(self)}
|
2015-09-18 19:54:08 +00:00
|
|
|
var err error
|
|
|
|
if add {
|
2016-03-01 02:17:04 +00:00
|
|
|
err = d.DiscoverNew(discoverapi.NodeDiscovery, nodeData)
|
2015-09-18 19:54:08 +00:00
|
|
|
} else {
|
2016-03-01 02:17:04 +00:00
|
|
|
err = d.DiscoverDelete(discoverapi.NodeDiscovery, nodeData)
|
2015-09-18 19:54:08 +00:00
|
|
|
}
|
|
|
|
if err != nil {
|
2016-12-27 11:42:32 +00:00
|
|
|
logrus.Debugf("discovery notification error: %v", err)
|
2015-09-18 19:54:08 +00:00
|
|
|
}
|
|
|
|
}
|
2015-05-15 22:23:59 +00:00
|
|
|
}
|
|
|
|
|
2015-06-11 13:52:46 +00:00
|
|
|
func (c *controller) Config() config.Config {
|
|
|
|
c.Lock()
|
|
|
|
defer c.Unlock()
|
2015-06-13 21:28:34 +00:00
|
|
|
if c.cfg == nil {
|
|
|
|
return config.Config{}
|
|
|
|
}
|
2015-06-11 13:52:46 +00:00
|
|
|
return *c.cfg
|
|
|
|
}
|
|
|
|
|
2016-05-24 23:17:19 +00:00
|
|
|
func (c *controller) isManager() bool {
|
2016-07-22 21:21:28 +00:00
|
|
|
c.Lock()
|
|
|
|
defer c.Unlock()
|
2016-05-24 23:17:19 +00:00
|
|
|
if c.cfg == nil || c.cfg.Daemon.ClusterProvider == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return c.cfg.Daemon.ClusterProvider.IsManager()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *controller) isAgent() bool {
|
2016-07-22 21:21:28 +00:00
|
|
|
c.Lock()
|
|
|
|
defer c.Unlock()
|
2016-05-24 23:17:19 +00:00
|
|
|
if c.cfg == nil || c.cfg.Daemon.ClusterProvider == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return c.cfg.Daemon.ClusterProvider.IsAgent()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *controller) isDistributedControl() bool {
|
|
|
|
return !c.isManager() && !c.isAgent()
|
|
|
|
}
|
|
|
|
|
2016-10-07 18:58:10 +00:00
|
|
|
func (c *controller) GetPluginGetter() plugingetter.PluginGetter {
|
2016-09-27 20:54:25 +00:00
|
|
|
return c.drvRegistry.GetPluginGetter()
|
|
|
|
}
|
|
|
|
|
2015-06-06 17:21:51 +00:00
|
|
|
func (c *controller) RegisterDriver(networkType string, driver driverapi.Driver, capability driverapi.Capability) error {
|
2015-09-11 18:02:16 +00:00
|
|
|
c.Lock()
|
2015-09-18 19:54:08 +00:00
|
|
|
hd := c.discovery
|
2015-06-16 02:09:59 +00:00
|
|
|
c.Unlock()
|
|
|
|
|
2015-09-18 19:54:08 +00:00
|
|
|
if hd != nil {
|
2016-03-01 02:17:04 +00:00
|
|
|
c.pushNodeDiscovery(driver, capability, hd.Fetch(), true)
|
2015-09-22 20:20:55 +00:00
|
|
|
}
|
|
|
|
|
2016-03-30 21:42:58 +00:00
|
|
|
c.agentDriverNotify(driver)
|
2015-09-22 20:20:55 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-04-30 01:25:01 +00:00
|
|
|
// NewNetwork creates a new network of the specified network type. The options
|
|
|
|
// are network specific and modeled in a generic way.
|
2016-02-29 19:49:04 +00:00
|
|
|
func (c *controller) NewNetwork(networkType, name string, id string, options ...NetworkOption) (Network, error) {
|
2016-09-12 22:19:22 +00:00
|
|
|
if id != "" {
|
|
|
|
c.networkLocker.Lock(id)
|
|
|
|
defer c.networkLocker.Unlock(id)
|
|
|
|
|
|
|
|
if _, err := c.NetworkByID(id); err == nil {
|
|
|
|
return nil, NetworkNameError(id)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-17 15:37:10 +00:00
|
|
|
if err := config.ValidateName(name); err != nil {
|
|
|
|
return nil, ErrInvalidName(err.Error())
|
2015-05-08 02:59:06 +00:00
|
|
|
}
|
2015-04-30 01:25:01 +00:00
|
|
|
|
2016-02-29 19:49:04 +00:00
|
|
|
if id == "" {
|
|
|
|
id = stringid.GenerateRandomID()
|
|
|
|
}
|
|
|
|
|
2016-10-12 23:55:20 +00:00
|
|
|
defaultIpam := defaultIpamForNetworkType(networkType)
|
2015-04-30 01:25:01 +00:00
|
|
|
// Construct the network object
|
|
|
|
network := &network{
|
2015-05-30 03:42:23 +00:00
|
|
|
name: name,
|
|
|
|
networkType: networkType,
|
2015-10-13 17:37:53 +00:00
|
|
|
generic: map[string]interface{}{netlabel.GenericData: make(map[string]string)},
|
2016-10-12 23:55:20 +00:00
|
|
|
ipamType: defaultIpam,
|
2016-02-29 19:49:04 +00:00
|
|
|
id: id,
|
2016-09-20 15:59:32 +00:00
|
|
|
created: time.Now(),
|
2015-05-30 03:42:23 +00:00
|
|
|
ctrlr: c,
|
2015-09-22 14:09:39 +00:00
|
|
|
persist: true,
|
2015-10-05 11:21:15 +00:00
|
|
|
drvOnce: &sync.Once{},
|
2015-04-30 01:25:01 +00:00
|
|
|
}
|
|
|
|
|
2015-05-01 00:57:06 +00:00
|
|
|
network.processOptions(options...)
|
2015-05-31 18:49:11 +00:00
|
|
|
|
2016-05-24 23:17:19 +00:00
|
|
|
_, cap, err := network.resolveDriver(networkType, true)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if cap.DataScope == datastore.GlobalScope && !c.isDistributedControl() && !network.dynamic {
|
|
|
|
if c.isManager() {
|
|
|
|
// For non-distributed controlled environment, globalscoped non-dynamic networks are redirected to Manager
|
|
|
|
return nil, ManagerRedirectError(name)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, types.ForbiddenErrorf("Cannot create a multi-host network from a worker node. Please create the network from a manager node.")
|
|
|
|
}
|
|
|
|
|
2015-10-05 11:21:15 +00:00
|
|
|
// Make sure we have a driver available for this network type
|
|
|
|
// before we allocate anything.
|
2016-01-16 22:24:44 +00:00
|
|
|
if _, err := network.driver(true); err != nil {
|
2015-10-03 23:11:50 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2016-05-24 23:17:19 +00:00
|
|
|
err = network.ipamAllocate()
|
2015-10-03 23:11:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
if err != nil {
|
2015-10-04 04:25:57 +00:00
|
|
|
network.ipamRelease()
|
2015-10-03 23:11:50 +00:00
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
2016-03-30 21:42:58 +00:00
|
|
|
err = c.addNetwork(network)
|
|
|
|
if err != nil {
|
2015-04-30 01:25:01 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
2015-10-12 05:28:26 +00:00
|
|
|
defer func() {
|
|
|
|
if err != nil {
|
|
|
|
if e := network.deleteNetwork(); e != nil {
|
2016-11-01 04:26:14 +00:00
|
|
|
logrus.Warnf("couldn't roll back driver network on network %s creation failure: %v", network.name, err)
|
2015-10-12 05:28:26 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
2015-04-30 01:25:01 +00:00
|
|
|
|
2016-03-05 10:00:31 +00:00
|
|
|
// First store the endpoint count, then the network. To avoid to
|
|
|
|
// end up with a datastore containing a network and not an epCnt,
|
|
|
|
// in case of an ungraceful shutdown during this function call.
|
|
|
|
epCnt := &endpointCnt{n: network}
|
|
|
|
if err = c.updateToStore(epCnt); err != nil {
|
2015-10-12 05:28:26 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
if err != nil {
|
2016-03-05 10:00:31 +00:00
|
|
|
if e := c.deleteFromStore(epCnt); e != nil {
|
2016-11-01 04:26:14 +00:00
|
|
|
logrus.Warnf("could not rollback from store, epCnt %v on failure (%v): %v", epCnt, err, e)
|
2015-10-12 05:28:26 +00:00
|
|
|
}
|
2015-06-05 20:31:12 +00:00
|
|
|
}
|
2015-10-12 05:28:26 +00:00
|
|
|
}()
|
|
|
|
|
2016-03-05 10:00:31 +00:00
|
|
|
network.epCnt = epCnt
|
|
|
|
if err = c.updateToStore(network); err != nil {
|
2015-05-30 03:42:23 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2016-07-13 00:35:32 +00:00
|
|
|
joinCluster(network)
|
2016-08-15 17:54:18 +00:00
|
|
|
if !c.isDistributedControl() {
|
|
|
|
arrangeIngressFilterRule()
|
|
|
|
}
|
2016-03-30 21:42:58 +00:00
|
|
|
|
2015-04-30 01:25:01 +00:00
|
|
|
return network, nil
|
|
|
|
}
|
|
|
|
|
2016-07-13 00:35:32 +00:00
|
|
|
var joinCluster NetworkWalker = func(nw Network) bool {
|
|
|
|
n := nw.(*network)
|
|
|
|
if err := n.joinCluster(); err != nil {
|
2016-11-01 04:26:14 +00:00
|
|
|
logrus.Errorf("Failed to join network %s (%s) into agent cluster: %v", n.Name(), n.ID(), err)
|
2016-07-13 00:35:32 +00:00
|
|
|
}
|
|
|
|
n.addDriverWatches()
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2016-04-18 22:11:36 +00:00
|
|
|
func (c *controller) reservePools() {
|
|
|
|
networks, err := c.getNetworksForScope(datastore.LocalScope)
|
|
|
|
if err != nil {
|
2016-11-01 04:26:14 +00:00
|
|
|
logrus.Warnf("Could not retrieve networks from local store during ipam allocation for existing networks: %v", err)
|
2016-04-18 22:11:36 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, n := range networks {
|
|
|
|
if !doReplayPoolReserve(n) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
// Construct pseudo configs for the auto IP case
|
|
|
|
autoIPv4 := (len(n.ipamV4Config) == 0 || (len(n.ipamV4Config) == 1 && n.ipamV4Config[0].PreferredPool == "")) && len(n.ipamV4Info) > 0
|
|
|
|
autoIPv6 := (len(n.ipamV6Config) == 0 || (len(n.ipamV6Config) == 1 && n.ipamV6Config[0].PreferredPool == "")) && len(n.ipamV6Info) > 0
|
|
|
|
if autoIPv4 {
|
|
|
|
n.ipamV4Config = []*IpamConf{{PreferredPool: n.ipamV4Info[0].Pool.String()}}
|
|
|
|
}
|
|
|
|
if n.enableIPv6 && autoIPv6 {
|
|
|
|
n.ipamV6Config = []*IpamConf{{PreferredPool: n.ipamV6Info[0].Pool.String()}}
|
|
|
|
}
|
|
|
|
// Account current network gateways
|
|
|
|
for i, c := range n.ipamV4Config {
|
|
|
|
if c.Gateway == "" && n.ipamV4Info[i].Gateway != nil {
|
|
|
|
c.Gateway = n.ipamV4Info[i].Gateway.IP.String()
|
|
|
|
}
|
|
|
|
}
|
2016-09-15 18:21:33 +00:00
|
|
|
if n.enableIPv6 {
|
|
|
|
for i, c := range n.ipamV6Config {
|
|
|
|
if c.Gateway == "" && n.ipamV6Info[i].Gateway != nil {
|
|
|
|
c.Gateway = n.ipamV6Info[i].Gateway.IP.String()
|
|
|
|
}
|
2016-04-18 22:11:36 +00:00
|
|
|
}
|
|
|
|
}
|
2016-06-11 16:30:34 +00:00
|
|
|
// Reserve pools
|
2016-04-18 22:11:36 +00:00
|
|
|
if err := n.ipamAllocate(); err != nil {
|
2016-11-01 04:26:14 +00:00
|
|
|
logrus.Warnf("Failed to allocate ipam pool(s) for network %q (%s): %v", n.Name(), n.ID(), err)
|
2016-04-18 22:11:36 +00:00
|
|
|
}
|
2016-06-11 16:30:34 +00:00
|
|
|
// Reserve existing endpoints' addresses
|
|
|
|
ipam, _, err := n.getController().getIPAMDriver(n.ipamType)
|
|
|
|
if err != nil {
|
2016-11-01 04:26:14 +00:00
|
|
|
logrus.Warnf("Failed to retrieve ipam driver for network %q (%s) during address reservation", n.Name(), n.ID())
|
2016-06-11 16:30:34 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
epl, err := n.getEndpointsFromStore()
|
|
|
|
if err != nil {
|
2016-11-01 04:26:14 +00:00
|
|
|
logrus.Warnf("Failed to retrieve list of current endpoints on network %q (%s)", n.Name(), n.ID())
|
2016-06-11 16:30:34 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
for _, ep := range epl {
|
|
|
|
if err := ep.assignAddress(ipam, true, ep.Iface().AddressIPv6() != nil); err != nil {
|
2016-11-28 18:44:45 +00:00
|
|
|
logrus.Warnf("Failed to reserve current address for endpoint %q (%s) on network %q (%s)",
|
2016-06-11 16:30:34 +00:00
|
|
|
ep.Name(), ep.ID(), n.Name(), n.ID())
|
|
|
|
}
|
|
|
|
}
|
2016-04-18 22:11:36 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func doReplayPoolReserve(n *network) bool {
|
|
|
|
_, caps, err := n.getController().getIPAMDriver(n.ipamType)
|
|
|
|
if err != nil {
|
2016-11-01 04:26:14 +00:00
|
|
|
logrus.Warnf("Failed to retrieve ipam driver for network %q (%s): %v", n.Name(), n.ID(), err)
|
2016-04-18 22:11:36 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
return caps.RequiresRequestReplay
|
|
|
|
}
|
|
|
|
|
2015-05-31 18:49:11 +00:00
|
|
|
func (c *controller) addNetwork(n *network) error {
|
2016-01-16 22:24:44 +00:00
|
|
|
d, err := n.driver(true)
|
2015-10-05 11:21:15 +00:00
|
|
|
if err != nil {
|
2015-10-03 23:11:50 +00:00
|
|
|
return err
|
2015-05-31 18:49:11 +00:00
|
|
|
}
|
2015-05-13 21:12:57 +00:00
|
|
|
|
2015-05-31 18:49:11 +00:00
|
|
|
// Create the network
|
2016-03-30 21:42:58 +00:00
|
|
|
if err := d.CreateNetwork(n.id, n.generic, n, n.getIPData(4), n.getIPData(6)); err != nil {
|
2015-05-31 18:49:11 +00:00
|
|
|
return err
|
|
|
|
}
|
2015-05-13 15:41:45 +00:00
|
|
|
|
2016-09-19 22:48:06 +00:00
|
|
|
n.startResolver()
|
|
|
|
|
2015-05-30 03:42:23 +00:00
|
|
|
return nil
|
2015-05-13 15:41:45 +00:00
|
|
|
}
|
|
|
|
|
2015-04-30 01:25:01 +00:00
|
|
|
func (c *controller) Networks() []Network {
|
2015-10-05 11:21:15 +00:00
|
|
|
var list []Network
|
2015-04-30 01:25:01 +00:00
|
|
|
|
2015-10-05 11:21:15 +00:00
|
|
|
networks, err := c.getNetworksFromStore()
|
|
|
|
if err != nil {
|
2016-11-01 04:26:14 +00:00
|
|
|
logrus.Error(err)
|
2015-10-05 11:21:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, n := range networks {
|
2016-03-05 10:00:31 +00:00
|
|
|
if n.inDelete {
|
|
|
|
continue
|
|
|
|
}
|
2015-04-30 01:25:01 +00:00
|
|
|
list = append(list, n)
|
|
|
|
}
|
|
|
|
|
|
|
|
return list
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *controller) WalkNetworks(walker NetworkWalker) {
|
|
|
|
for _, n := range c.Networks() {
|
|
|
|
if walker(n) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-05-11 23:13:27 +00:00
|
|
|
func (c *controller) NetworkByName(name string) (Network, error) {
|
|
|
|
if name == "" {
|
2015-05-14 21:56:15 +00:00
|
|
|
return nil, ErrInvalidName(name)
|
2015-05-11 23:13:27 +00:00
|
|
|
}
|
2015-04-30 01:25:01 +00:00
|
|
|
var n Network
|
|
|
|
|
2015-05-11 23:13:27 +00:00
|
|
|
s := func(current Network) bool {
|
|
|
|
if current.Name() == name {
|
|
|
|
n = current
|
|
|
|
return true
|
2015-04-30 01:25:01 +00:00
|
|
|
}
|
2015-05-11 23:13:27 +00:00
|
|
|
return false
|
2015-04-30 01:25:01 +00:00
|
|
|
}
|
|
|
|
|
2015-05-11 23:13:27 +00:00
|
|
|
c.WalkNetworks(s)
|
|
|
|
|
2015-05-15 23:04:09 +00:00
|
|
|
if n == nil {
|
2015-05-14 21:56:15 +00:00
|
|
|
return nil, ErrNoSuchNetwork(name)
|
2015-05-15 23:04:09 +00:00
|
|
|
}
|
|
|
|
|
2015-05-11 23:13:27 +00:00
|
|
|
return n, nil
|
2015-04-30 01:25:01 +00:00
|
|
|
}
|
|
|
|
|
2015-05-11 23:13:27 +00:00
|
|
|
func (c *controller) NetworkByID(id string) (Network, error) {
|
|
|
|
if id == "" {
|
2015-05-14 21:56:15 +00:00
|
|
|
return nil, ErrInvalidID(id)
|
2015-05-11 23:13:27 +00:00
|
|
|
}
|
2015-10-05 11:21:15 +00:00
|
|
|
|
|
|
|
n, err := c.getNetworkFromStore(id)
|
|
|
|
if err != nil {
|
|
|
|
return nil, ErrNoSuchNetwork(id)
|
2015-04-30 01:25:01 +00:00
|
|
|
}
|
2015-10-05 11:21:15 +00:00
|
|
|
|
|
|
|
return n, nil
|
2015-04-30 01:25:01 +00:00
|
|
|
}
|
|
|
|
|
2015-07-02 05:00:48 +00:00
|
|
|
// NewSandbox creates a new sandbox for the passed container id
|
2016-05-31 06:55:51 +00:00
|
|
|
func (c *controller) NewSandbox(containerID string, options ...SandboxOption) (sBox Sandbox, err error) {
|
2015-07-02 05:00:48 +00:00
|
|
|
if containerID == "" {
|
|
|
|
return nil, types.BadRequestErrorf("invalid container ID")
|
|
|
|
}
|
|
|
|
|
2015-11-02 07:03:26 +00:00
|
|
|
var sb *sandbox
|
|
|
|
c.Lock()
|
|
|
|
for _, s := range c.sandboxes {
|
|
|
|
if s.containerID == containerID {
|
|
|
|
// If not a stub, then we already have a complete sandbox.
|
|
|
|
if !s.isStub {
|
2016-10-04 22:40:47 +00:00
|
|
|
sbID := s.ID()
|
2015-11-02 07:03:26 +00:00
|
|
|
c.Unlock()
|
2016-10-04 22:40:47 +00:00
|
|
|
return nil, types.ForbiddenErrorf("container %s is already present in sandbox %s", containerID, sbID)
|
2015-11-02 07:03:26 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// We already have a stub sandbox from the
|
|
|
|
// store. Make use of it so that we don't lose
|
|
|
|
// the endpoints from store but reset the
|
|
|
|
// isStub flag.
|
|
|
|
sb = s
|
|
|
|
sb.isStub = false
|
|
|
|
break
|
|
|
|
}
|
2015-07-02 05:00:48 +00:00
|
|
|
}
|
2015-11-02 07:03:26 +00:00
|
|
|
c.Unlock()
|
2015-07-02 05:00:48 +00:00
|
|
|
|
|
|
|
// Create sandbox and process options first. Key generation depends on an option
|
2015-11-02 07:03:26 +00:00
|
|
|
if sb == nil {
|
|
|
|
sb = &sandbox{
|
2016-06-15 21:00:48 +00:00
|
|
|
id: stringid.GenerateRandomID(),
|
|
|
|
containerID: containerID,
|
|
|
|
endpoints: epHeap{},
|
|
|
|
epPriority: map[string]int{},
|
|
|
|
populatedEndpoints: map[string]struct{}{},
|
|
|
|
config: containerConfig{},
|
|
|
|
controller: c,
|
2016-12-19 02:27:13 +00:00
|
|
|
extDNS: []extDNSEntry{},
|
2015-11-02 07:03:26 +00:00
|
|
|
}
|
2015-07-02 05:00:48 +00:00
|
|
|
}
|
2016-05-31 06:55:51 +00:00
|
|
|
sBox = sb
|
2015-07-02 05:00:48 +00:00
|
|
|
|
|
|
|
heap.Init(&sb.endpoints)
|
|
|
|
|
|
|
|
sb.processOptions(options...)
|
|
|
|
|
2016-05-31 06:55:51 +00:00
|
|
|
c.Lock()
|
|
|
|
if sb.ingress && c.ingressSandbox != nil {
|
2016-06-04 16:37:16 +00:00
|
|
|
c.Unlock()
|
2016-07-13 04:02:10 +00:00
|
|
|
return nil, types.ForbiddenErrorf("ingress sandbox already present")
|
2016-05-31 06:55:51 +00:00
|
|
|
}
|
|
|
|
|
2016-06-08 02:49:36 +00:00
|
|
|
if sb.ingress {
|
|
|
|
c.ingressSandbox = sb
|
2016-09-15 22:22:57 +00:00
|
|
|
sb.id = "ingress_sbox"
|
2016-06-08 02:49:36 +00:00
|
|
|
}
|
2016-05-31 06:55:51 +00:00
|
|
|
c.Unlock()
|
|
|
|
defer func() {
|
|
|
|
if err != nil {
|
|
|
|
c.Lock()
|
|
|
|
if sb.ingress {
|
|
|
|
c.ingressSandbox = nil
|
|
|
|
}
|
|
|
|
c.Unlock()
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
2015-09-02 01:55:53 +00:00
|
|
|
if err = sb.setupResolutionFiles(); err != nil {
|
2015-07-02 05:00:48 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2015-11-01 06:15:15 +00:00
|
|
|
if sb.config.useDefaultSandBox {
|
|
|
|
c.sboxOnce.Do(func() {
|
2016-06-11 00:32:19 +00:00
|
|
|
c.defOsSbox, err = osl.NewSandbox(sb.Key(), false, false)
|
2015-11-01 06:15:15 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
c.sboxOnce = sync.Once{}
|
|
|
|
return nil, fmt.Errorf("failed to create default sandbox: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
sb.osSbox = c.defOsSbox
|
|
|
|
}
|
|
|
|
|
2015-09-09 23:20:54 +00:00
|
|
|
if sb.osSbox == nil && !sb.config.useExternalKey {
|
2016-06-11 00:32:19 +00:00
|
|
|
if sb.osSbox, err = osl.NewSandbox(sb.Key(), !sb.config.useDefaultSandBox, false); err != nil {
|
2015-07-02 05:00:48 +00:00
|
|
|
return nil, fmt.Errorf("failed to create new osl sandbox: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-11-01 06:15:15 +00:00
|
|
|
c.Lock()
|
2015-07-02 05:00:48 +00:00
|
|
|
c.sandboxes[sb.id] = sb
|
|
|
|
c.Unlock()
|
2015-10-08 03:01:38 +00:00
|
|
|
defer func() {
|
|
|
|
if err != nil {
|
|
|
|
c.Lock()
|
|
|
|
delete(c.sandboxes, sb.id)
|
|
|
|
c.Unlock()
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
err = sb.storeUpdate()
|
|
|
|
if err != nil {
|
2016-12-27 11:42:32 +00:00
|
|
|
return nil, fmt.Errorf("failed to update the store state of sandbox: %v", err)
|
2015-10-08 03:01:38 +00:00
|
|
|
}
|
2015-07-02 05:00:48 +00:00
|
|
|
|
|
|
|
return sb, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *controller) Sandboxes() []Sandbox {
|
|
|
|
c.Lock()
|
|
|
|
defer c.Unlock()
|
|
|
|
|
|
|
|
list := make([]Sandbox, 0, len(c.sandboxes))
|
|
|
|
for _, s := range c.sandboxes {
|
2015-11-02 07:03:26 +00:00
|
|
|
// Hide stub sandboxes from libnetwork users
|
|
|
|
if s.isStub {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2015-07-02 05:00:48 +00:00
|
|
|
list = append(list, s)
|
|
|
|
}
|
|
|
|
|
|
|
|
return list
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *controller) WalkSandboxes(walker SandboxWalker) {
|
|
|
|
for _, sb := range c.Sandboxes() {
|
|
|
|
if walker(sb) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *controller) SandboxByID(id string) (Sandbox, error) {
|
|
|
|
if id == "" {
|
|
|
|
return nil, ErrInvalidID(id)
|
|
|
|
}
|
|
|
|
c.Lock()
|
|
|
|
s, ok := c.sandboxes[id]
|
|
|
|
c.Unlock()
|
|
|
|
if !ok {
|
|
|
|
return nil, types.NotFoundErrorf("sandbox %s not found", id)
|
|
|
|
}
|
|
|
|
return s, nil
|
|
|
|
}
|
|
|
|
|
2015-11-02 07:03:26 +00:00
|
|
|
// SandboxDestroy destroys a sandbox given a container ID
|
|
|
|
func (c *controller) SandboxDestroy(id string) error {
|
|
|
|
var sb *sandbox
|
|
|
|
c.Lock()
|
|
|
|
for _, s := range c.sandboxes {
|
|
|
|
if s.containerID == id {
|
|
|
|
sb = s
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
c.Unlock()
|
|
|
|
|
|
|
|
// It is not an error if sandbox is not available
|
|
|
|
if sb == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return sb.Delete()
|
|
|
|
}
|
|
|
|
|
2015-07-02 05:00:48 +00:00
|
|
|
// SandboxContainerWalker returns a Sandbox Walker function which looks for an existing Sandbox with the passed containerID
|
|
|
|
func SandboxContainerWalker(out *Sandbox, containerID string) SandboxWalker {
|
|
|
|
return func(sb Sandbox) bool {
|
|
|
|
if sb.ContainerID() == containerID {
|
|
|
|
*out = sb
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// SandboxKeyWalker returns a Sandbox Walker function which looks for an existing Sandbox with the passed key
|
|
|
|
func SandboxKeyWalker(out *Sandbox, key string) SandboxWalker {
|
|
|
|
return func(sb Sandbox) bool {
|
|
|
|
if sb.Key() == key {
|
|
|
|
*out = sb
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-03-01 02:17:04 +00:00
|
|
|
func (c *controller) loadDriver(networkType string) error {
|
2016-10-17 21:35:38 +00:00
|
|
|
var err error
|
|
|
|
|
|
|
|
if pg := c.GetPluginGetter(); pg != nil {
|
2017-01-10 21:17:15 +00:00
|
|
|
_, err = pg.Get(networkType, driverapi.NetworkPluginEndpointType, plugingetter.Lookup)
|
2016-10-17 21:35:38 +00:00
|
|
|
} else {
|
|
|
|
_, err = plugins.Get(networkType, driverapi.NetworkPluginEndpointType)
|
|
|
|
}
|
|
|
|
|
2015-05-16 01:14:36 +00:00
|
|
|
if err != nil {
|
2015-05-14 21:56:15 +00:00
|
|
|
if err == plugins.ErrNotFound {
|
2016-03-01 02:17:04 +00:00
|
|
|
return types.NotFoundErrorf(err.Error())
|
2015-05-14 21:56:15 +00:00
|
|
|
}
|
2016-03-01 02:17:04 +00:00
|
|
|
return err
|
2015-05-16 01:14:36 +00:00
|
|
|
}
|
2016-03-01 02:17:04 +00:00
|
|
|
|
|
|
|
return nil
|
2015-06-06 17:21:51 +00:00
|
|
|
}
|
|
|
|
|
2016-03-01 02:17:04 +00:00
|
|
|
func (c *controller) loadIPAMDriver(name string) error {
|
2016-10-17 21:35:38 +00:00
|
|
|
var err error
|
|
|
|
|
|
|
|
if pg := c.GetPluginGetter(); pg != nil {
|
2017-01-10 21:17:15 +00:00
|
|
|
_, err = pg.Get(name, ipamapi.PluginEndpointType, plugingetter.Lookup)
|
2016-10-17 21:35:38 +00:00
|
|
|
} else {
|
|
|
|
_, err = plugins.Get(name, ipamapi.PluginEndpointType)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil {
|
2015-09-22 20:20:55 +00:00
|
|
|
if err == plugins.ErrNotFound {
|
2016-03-01 02:17:04 +00:00
|
|
|
return types.NotFoundErrorf(err.Error())
|
2015-09-22 20:20:55 +00:00
|
|
|
}
|
2016-03-01 02:17:04 +00:00
|
|
|
return err
|
2015-09-18 19:54:08 +00:00
|
|
|
}
|
2015-09-22 20:20:55 +00:00
|
|
|
|
2016-03-01 02:17:04 +00:00
|
|
|
return nil
|
2015-09-22 20:20:55 +00:00
|
|
|
}
|
|
|
|
|
2016-03-01 02:17:04 +00:00
|
|
|
func (c *controller) getIPAMDriver(name string) (ipamapi.Ipam, *ipamapi.Capability, error) {
|
|
|
|
id, cap := c.drvRegistry.IPAM(name)
|
|
|
|
if id == nil {
|
|
|
|
// Might be a plugin name. Try loading it
|
|
|
|
if err := c.loadIPAMDriver(name); err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
2015-09-18 19:54:08 +00:00
|
|
|
|
2016-03-01 02:17:04 +00:00
|
|
|
// Now that we resolved the plugin, try again looking up the registry
|
|
|
|
id, cap = c.drvRegistry.IPAM(name)
|
|
|
|
if id == nil {
|
|
|
|
return nil, nil, types.BadRequestErrorf("invalid ipam driver: %q", name)
|
|
|
|
}
|
2016-02-16 23:19:18 +00:00
|
|
|
}
|
|
|
|
|
2016-03-01 02:17:04 +00:00
|
|
|
return id, cap, nil
|
2016-02-16 23:19:18 +00:00
|
|
|
}
|
|
|
|
|
2015-09-09 21:24:05 +00:00
|
|
|
func (c *controller) Stop() {
|
2016-09-29 22:01:44 +00:00
|
|
|
c.clearIngress(false)
|
2015-10-05 11:21:15 +00:00
|
|
|
c.closeStores()
|
2015-09-09 21:24:05 +00:00
|
|
|
c.stopExternalKeyListener()
|
2015-07-02 05:00:48 +00:00
|
|
|
osl.GC()
|
2015-06-05 18:46:33 +00:00
|
|
|
}
|
2016-09-29 22:01:44 +00:00
|
|
|
|
|
|
|
func (c *controller) clearIngress(clusterLeave bool) {
|
|
|
|
c.Lock()
|
|
|
|
ingressSandbox := c.ingressSandbox
|
|
|
|
c.ingressSandbox = nil
|
|
|
|
c.Unlock()
|
|
|
|
|
|
|
|
if ingressSandbox != nil {
|
|
|
|
if err := ingressSandbox.Delete(); err != nil {
|
2016-11-01 04:26:14 +00:00
|
|
|
logrus.Warnf("Could not delete ingress sandbox while leaving: %v", err)
|
2016-09-29 22:01:44 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
n, err := c.NetworkByName("ingress")
|
|
|
|
if err != nil && clusterLeave {
|
2016-11-01 04:26:14 +00:00
|
|
|
logrus.Warnf("Could not find ingress network while leaving: %v", err)
|
2016-09-29 22:01:44 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if n != nil {
|
|
|
|
if err := n.Delete(); err != nil {
|
2016-11-01 04:26:14 +00:00
|
|
|
logrus.Warnf("Could not delete ingress network while leaving: %v", err)
|
2016-09-29 22:01:44 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|