Little helper to run CNCF's k3s in Docker
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
k3d/pkg/runtimes/docker/network.go

393 lines
14 KiB

/*
Copyright © 2020-2023 The k3d Author(s)
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
*/
package docker
import (
"context"
"fmt"
"net/netip"
"strings"
"github.com/docker/docker/api/types"
"github.com/docker/docker/api/types/filters"
"github.com/docker/docker/api/types/network"
l "github.com/k3d-io/k3d/v5/pkg/logger"
runtimeErr "github.com/k3d-io/k3d/v5/pkg/runtimes/errors"
k3d "github.com/k3d-io/k3d/v5/pkg/types"
"github.com/k3d-io/k3d/v5/pkg/util"
)
// GetNetwork returns a given network
func (d Docker) GetNetwork(ctx context.Context, searchNet *k3d.ClusterNetwork) (*k3d.ClusterNetwork, error) {
// (0) create new docker client
docker, err := GetDockerClient()
if err != nil {
return nil, fmt.Errorf("failed to create docker client: %w", err)
}
defer docker.Close()
if searchNet.ID == "" && searchNet.Name == "" {
return nil, fmt.Errorf("failed to get network, because neither name nor ID was provided")
}
// configure list filters
filter := filters.NewArgs()
if searchNet.ID != "" {
filter.Add("id", fmt.Sprintf("^/?%s$", searchNet.ID)) // regex filtering for exact ID match
}
if searchNet.Name != "" {
filter.Add("name", fmt.Sprintf("^/?%s$", searchNet.Name)) // regex filtering for exact name match
}
// get filtered list of networks
networkList, err := docker.NetworkList(ctx, types.NetworkListOptions{
Filters: filter,
})
if err != nil {
return nil, fmt.Errorf("docker failed to list networks: %w", err)
}
if len(networkList) == 0 {
return nil, runtimeErr.ErrRuntimeNetworkNotExists
}
targetNetwork, err := docker.NetworkInspect(ctx, networkList[0].ID, types.NetworkInspectOptions{})
if err != nil {
return nil, fmt.Errorf("docker failed to inspect network %s: %w", networkList[0].Name, err)
}
l.Log().Debugf("Found network %+v", targetNetwork)
network := &k3d.ClusterNetwork{
Name: targetNetwork.Name,
ID: targetNetwork.ID,
}
// for networks that have an IPAM config, we inspect that as well (e.g. "host" network doesn't have it)
if len(targetNetwork.IPAM.Config) > 0 {
network.IPAM, err = d.parseIPAM(targetNetwork.IPAM.Config[0])
if err != nil {
return nil, fmt.Errorf("failed to parse IPAM config: %w", err)
}
for _, container := range targetNetwork.Containers {
if container.IPv4Address != "" {
ipAddr, err := parseIPAddress(container.IPv4Address)
if err != nil {
return nil, fmt.Errorf("failed to parse IP address of container %s: %w", container.Name, err)
}
network.IPAM.IPsUsed = append(network.IPAM.IPsUsed, ipAddr)
}
}
// append the used IPs that we already know from the search network
// this is needed because the network inspect does not return the container list until the containers are actually started
// and we already need this when we create the containers
network.IPAM.IPsUsed = append(network.IPAM.IPsUsed, searchNet.IPAM.IPsUsed...)
} else {
l.Log().Debugf("Network %s does not have an IPAM config", network.Name)
}
for _, container := range targetNetwork.Containers {
ipAddr, err := parseIPAddress(container.IPv4Address)
if err != nil {
return nil, fmt.Errorf("failed to parse IP Prefix of network \"%s\"'s member %s: %v", network.Name, container.Name, err)
}
network.Members = append(network.Members, &k3d.NetworkMember{
Name: container.Name,
IP: ipAddr,
})
}
// Only one Network allowed, but some functions don't care about this, so they can ignore the error and just use the first one returned
if len(networkList) > 1 {
return network, runtimeErr.ErrRuntimeNetworkMultiSameName
}
return network, nil
}
// CreateNetworkIfNotPresent creates a new docker network
// @return: network, exists, error
func (d Docker) CreateNetworkIfNotPresent(ctx context.Context, inNet *k3d.ClusterNetwork) (*k3d.ClusterNetwork, bool, error) {
// (0) create new docker client
docker, err := GetDockerClient()
if err != nil {
return nil, false, fmt.Errorf("failed to create docker client: %w", err)
}
defer docker.Close()
existingNet, err := d.GetNetwork(ctx, inNet)
if err != nil {
if err != runtimeErr.ErrRuntimeNetworkNotExists {
if existingNet == nil {
return nil, false, fmt.Errorf("failed to check for duplicate docker networks: %w", err)
} else if err == runtimeErr.ErrRuntimeNetworkMultiSameName {
l.Log().Warnf("%+v, returning the first one: %s (%s)", err, existingNet.Name, existingNet.ID)
return existingNet, true, nil
} else {
return nil, false, fmt.Errorf("unhandled error while checking for existing networks: %+v", err)
}
}
}
if existingNet != nil {
return existingNet, true, nil
}
labels := make(map[string]string, 0)
for k, v := range k3d.DefaultRuntimeLabels {
labels[k] = v
}
// (3) Create a new network
netCreateOpts := types.NetworkCreate{
Driver: "bridge",
Options: map[string]string{
"com.docker.network.bridge.enable_ip_masquerade": "true",
},
CheckDuplicate: true,
Labels: labels,
}
// we want a managed (user-defined) network, but user didn't specify a subnet, so we try to auto-generate one
if inNet.IPAM.Managed && inNet.IPAM.IPPrefix == (netip.Prefix{}) {
l.Log().Traceln("No subnet prefix given, but network should be managed: Trying to get a free subnet prefix...")
freeSubnetPrefix, err := d.getFreeSubnetPrefix(ctx)
if err != nil {
return nil, false, fmt.Errorf("failed to get free subnet prefix: %w", err)
}
inNet.IPAM.IPPrefix = freeSubnetPrefix
}
// use user-defined subnet, if given
if inNet.IPAM.IPPrefix != (netip.Prefix{}) {
l.Log().Debugf("Using user-defined subnet prefix %s", inNet.IPAM.IPPrefix.String())
if !inNet.IPAM.IPPrefix.IsValid() {
return nil, false, fmt.Errorf("invalid subnet prefix: %s", inNet.IPAM.IPPrefix.String())
}
netCreateOpts.IPAM = &network.IPAM{
Config: []network.IPAMConfig{
{
Subnet: inNet.IPAM.IPPrefix.String(),
Gateway: inNet.IPAM.IPPrefix.Addr().Next().String(), // second IP in subnet will be the Gateway (Next, so we don't hit x.x.x.0)
},
},
}
}
newNet, err := docker.NetworkCreate(ctx, inNet.Name, netCreateOpts)
if err != nil {
return nil, false, fmt.Errorf("docker failed to create new network '%s': %w", inNet.Name, err)
}
networkDetails, err := docker.NetworkInspect(ctx, newNet.ID, types.NetworkInspectOptions{})
if err != nil {
return nil, false, fmt.Errorf("docker failed to inspect newly created network '%s': %w", newNet.ID, err)
}
l.Log().Infof("Created network '%s'", inNet.Name)
prefix, err := netip.ParsePrefix(networkDetails.IPAM.Config[0].Subnet)
if err != nil {
return nil, false, fmt.Errorf("failed to parse IP Prefix of newly created network '%s': %w", newNet.ID, err)
}
newClusterNet := &k3d.ClusterNetwork{Name: inNet.Name, ID: networkDetails.ID, IPAM: k3d.IPAM{IPPrefix: prefix}}
if inNet.IPAM.IPPrefix != (netip.Prefix{}) {
newClusterNet.IPAM.Managed = true
}
return newClusterNet, false, nil
}
// DeleteNetwork deletes a network
func (d Docker) DeleteNetwork(ctx context.Context, ID string) error {
// (0) create new docker client
docker, err := GetDockerClient()
if err != nil {
return fmt.Errorf("failed to get docker client: %w", err)
}
defer docker.Close()
// (3) delete network
if err := docker.NetworkRemove(ctx, ID); err != nil {
if strings.HasSuffix(err.Error(), "active endpoints") {
return runtimeErr.ErrRuntimeNetworkNotEmpty
}
return fmt.Errorf("docker failed to remove network '%s': %w", ID, err)
}
return nil
}
// GetNetwork gets information about a network by its ID
func GetNetwork(ctx context.Context, ID string) (types.NetworkResource, error) {
docker, err := GetDockerClient()
if err != nil {
return types.NetworkResource{}, fmt.Errorf("failed to get docker client: %w", err)
}
defer docker.Close()
return docker.NetworkInspect(ctx, ID, types.NetworkInspectOptions{})
}
// GetGatewayIP returns the IP of the network gateway
func GetGatewayIP(ctx context.Context, network string) (netip.Addr, error) {
bridgeNetwork, err := GetNetwork(ctx, network)
if err != nil {
return netip.Addr{}, fmt.Errorf("failed to get bridge network with name '%s': %w", network, err)
}
if len(bridgeNetwork.IPAM.Config) > 0 {
if bridgeNetwork.IPAM.Config[0].Gateway == "" {
return netip.Addr{}, fmt.Errorf("no gateway defined for network %s", bridgeNetwork.Name)
}
gatewayIP, err := netip.ParseAddr(bridgeNetwork.IPAM.Config[0].Gateway)
if err != nil {
return netip.Addr{}, fmt.Errorf("failed to get gateway of network %s: %w", bridgeNetwork.Name, err)
}
return gatewayIP, nil
} else {
return netip.Addr{}, fmt.Errorf("Failed to get IPAM Config for network %s", bridgeNetwork.Name)
}
}
// ConnectNodeToNetwork connects a node to a network
func (d Docker) ConnectNodeToNetwork(ctx context.Context, node *k3d.Node, networkName string) error {
// check that node was not attached to network before
if isAttachedToNetwork(node, networkName) {
l.Log().Infof("Container '%s' is already connected to '%s'", node.Name, networkName)
return nil
}
// get container
container, err := getNodeContainer(ctx, node)
if err != nil {
return fmt.Errorf("failed to get container for node '%s': %w", node.Name, err)
}
// get docker client
docker, err := GetDockerClient()
if err != nil {
return fmt.Errorf("failed to get docker client: %w", err)
}
defer docker.Close()
// get network
networkResource, err := GetNetwork(ctx, networkName)
if err != nil {
return fmt.Errorf("failed to get network '%s': %w", networkName, err)
}
// connect container to network
return docker.NetworkConnect(ctx, networkResource.ID, container.ID, &network.EndpointSettings{})
}
// DisconnectNodeFromNetwork disconnects a node from a network (u don't say :O)
func (d Docker) DisconnectNodeFromNetwork(ctx context.Context, node *k3d.Node, networkName string) error {
l.Log().Debugf("Disconnecting node %s from network %s...", node.Name, networkName)
// get container
container, err := getNodeContainer(ctx, node)
if err != nil {
return fmt.Errorf("failed to get container for node '%s': %w", node.Name, err)
}
// get docker client
docker, err := GetDockerClient()
if err != nil {
return fmt.Errorf("failed to get docker client: %w", err)
}
defer docker.Close()
// get network
networkResource, err := GetNetwork(ctx, networkName)
if err != nil {
return fmt.Errorf("failed to get network '%s': %w", networkName, err)
}
return docker.NetworkDisconnect(ctx, networkResource.ID, container.ID, true)
}
func (d Docker) getFreeSubnetPrefix(ctx context.Context) (netip.Prefix, error) {
// (0) create new docker client
docker, err := GetDockerClient()
if err != nil {
return netip.Prefix{}, fmt.Errorf("failed to create docker client %w", err)
}
defer docker.Close()
// 1. Create a fake network to get auto-generated subnet prefix
fakenetName := fmt.Sprintf("%s-fakenet-%s", k3d.DefaultObjectNamePrefix, util.GenerateRandomString(10))
fakenetResp, err := docker.NetworkCreate(ctx, fakenetName, types.NetworkCreate{})
if err != nil {
return netip.Prefix{}, fmt.Errorf("failed to create fake network: %w", err)
}
fakenet, err := d.GetNetwork(ctx, &k3d.ClusterNetwork{ID: fakenetResp.ID})
if err != nil {
return netip.Prefix{}, fmt.Errorf("failed to inspect fake network %s: %w", fakenetResp.ID, err)
}
l.Log().Tracef("Created fake network %s (%s) with subnet prefix %s. Deleting it again to re-use that prefix...", fakenet.Name, fakenet.ID, fakenet.IPAM.IPPrefix.String())
if err := d.DeleteNetwork(ctx, fakenet.ID); err != nil {
return netip.Prefix{}, fmt.Errorf("failed to delete fake network %s (%s): %w", fakenet.Name, fakenet.ID, err)
}
return fakenet.IPAM.IPPrefix, nil
}
// parseIPAM Returns an IPAM structure with the subnet and gateway filled in. If some of the values
// cannot be parsed, an error is returned. If gateway is empty, the function calculates the default gateway.
func (d Docker) parseIPAM(config network.IPAMConfig) (ipam k3d.IPAM, err error) {
var gateway netip.Addr
ipam = k3d.IPAM{IPsUsed: []netip.Addr{}}
ipam.IPPrefix, err = netip.ParsePrefix(config.Subnet)
if err != nil {
return
}
if config.Gateway == "" {
gateway = ipam.IPPrefix.Addr().Next()
} else {
gateway, err = netip.ParseAddr(config.Gateway)
}
ipam.IPsUsed = append(ipam.IPsUsed, gateway)
return
}
// parseIPAddress Returns an netip.Addr by either receiving the IP address or IP CIDR notation. If the value
// cannot be parsed, an error is returned
func parseIPAddress(addr string) (netip.Addr, error) {
if strings.Contains(addr, "/") {
prefix, err := netip.ParsePrefix(addr)
if err != nil {
return netip.Addr{}, err
}
return prefix.Addr(), nil
} else {
ipAddr, err := netip.ParseAddr(addr)
if err != nil {
return netip.Addr{}, err
}
return ipAddr, nil
}
}