github.com/endophage/docker@v1.4.2-0.20161027011718-242853499895/daemon/container_operations.go (about) 1 package daemon 2 3 import ( 4 "errors" 5 "fmt" 6 "net" 7 "os" 8 "path" 9 "runtime" 10 "strings" 11 12 "github.com/Sirupsen/logrus" 13 derr "github.com/docker/docker/api/errors" 14 containertypes "github.com/docker/docker/api/types/container" 15 networktypes "github.com/docker/docker/api/types/network" 16 "github.com/docker/docker/container" 17 "github.com/docker/docker/daemon/network" 18 "github.com/docker/docker/pkg/stringid" 19 "github.com/docker/docker/runconfig" 20 "github.com/docker/go-connections/nat" 21 "github.com/docker/libnetwork" 22 "github.com/docker/libnetwork/netlabel" 23 "github.com/docker/libnetwork/options" 24 "github.com/docker/libnetwork/types" 25 ) 26 27 var ( 28 // ErrRootFSReadOnly is returned when a container 29 // rootfs is marked readonly. 30 ErrRootFSReadOnly = errors.New("container rootfs is marked read-only") 31 getPortMapInfo = container.GetSandboxPortMapInfo 32 ) 33 34 func (daemon *Daemon) buildSandboxOptions(container *container.Container) ([]libnetwork.SandboxOption, error) { 35 var ( 36 sboxOptions []libnetwork.SandboxOption 37 err error 38 dns []string 39 dnsSearch []string 40 dnsOptions []string 41 bindings = make(nat.PortMap) 42 pbList []types.PortBinding 43 exposeList []types.TransportPort 44 ) 45 46 defaultNetName := runconfig.DefaultDaemonNetworkMode().NetworkName() 47 sboxOptions = append(sboxOptions, libnetwork.OptionHostname(container.Config.Hostname), 48 libnetwork.OptionDomainname(container.Config.Domainname)) 49 50 if container.HostConfig.NetworkMode.IsHost() { 51 sboxOptions = append(sboxOptions, libnetwork.OptionUseDefaultSandbox()) 52 if len(container.HostConfig.ExtraHosts) == 0 { 53 sboxOptions = append(sboxOptions, libnetwork.OptionOriginHostsPath("/etc/hosts")) 54 } 55 if len(container.HostConfig.DNS) == 0 && len(daemon.configStore.DNS) == 0 && 56 len(container.HostConfig.DNSSearch) == 0 && len(daemon.configStore.DNSSearch) == 0 && 57 len(container.HostConfig.DNSOptions) == 0 && len(daemon.configStore.DNSOptions) == 0 { 58 sboxOptions = append(sboxOptions, libnetwork.OptionOriginResolvConfPath("/etc/resolv.conf")) 59 } 60 } else { 61 // OptionUseExternalKey is mandatory for userns support. 62 // But optional for non-userns support 63 sboxOptions = append(sboxOptions, libnetwork.OptionUseExternalKey()) 64 } 65 66 if err = setupPathsAndSandboxOptions(container, &sboxOptions); err != nil { 67 return nil, err 68 } 69 70 if len(container.HostConfig.DNS) > 0 { 71 dns = container.HostConfig.DNS 72 } else if len(daemon.configStore.DNS) > 0 { 73 dns = daemon.configStore.DNS 74 } 75 76 for _, d := range dns { 77 sboxOptions = append(sboxOptions, libnetwork.OptionDNS(d)) 78 } 79 80 if len(container.HostConfig.DNSSearch) > 0 { 81 dnsSearch = container.HostConfig.DNSSearch 82 } else if len(daemon.configStore.DNSSearch) > 0 { 83 dnsSearch = daemon.configStore.DNSSearch 84 } 85 86 for _, ds := range dnsSearch { 87 sboxOptions = append(sboxOptions, libnetwork.OptionDNSSearch(ds)) 88 } 89 90 if len(container.HostConfig.DNSOptions) > 0 { 91 dnsOptions = container.HostConfig.DNSOptions 92 } else if len(daemon.configStore.DNSOptions) > 0 { 93 dnsOptions = daemon.configStore.DNSOptions 94 } 95 96 for _, ds := range dnsOptions { 97 sboxOptions = append(sboxOptions, libnetwork.OptionDNSOptions(ds)) 98 } 99 100 if container.NetworkSettings.SecondaryIPAddresses != nil { 101 name := container.Config.Hostname 102 if container.Config.Domainname != "" { 103 name = name + "." + container.Config.Domainname 104 } 105 106 for _, a := range container.NetworkSettings.SecondaryIPAddresses { 107 sboxOptions = append(sboxOptions, libnetwork.OptionExtraHost(name, a.Addr)) 108 } 109 } 110 111 for _, extraHost := range container.HostConfig.ExtraHosts { 112 // allow IPv6 addresses in extra hosts; only split on first ":" 113 parts := strings.SplitN(extraHost, ":", 2) 114 sboxOptions = append(sboxOptions, libnetwork.OptionExtraHost(parts[0], parts[1])) 115 } 116 117 if container.HostConfig.PortBindings != nil { 118 for p, b := range container.HostConfig.PortBindings { 119 bindings[p] = []nat.PortBinding{} 120 for _, bb := range b { 121 bindings[p] = append(bindings[p], nat.PortBinding{ 122 HostIP: bb.HostIP, 123 HostPort: bb.HostPort, 124 }) 125 } 126 } 127 } 128 129 portSpecs := container.Config.ExposedPorts 130 ports := make([]nat.Port, len(portSpecs)) 131 var i int 132 for p := range portSpecs { 133 ports[i] = p 134 i++ 135 } 136 nat.SortPortMap(ports, bindings) 137 for _, port := range ports { 138 expose := types.TransportPort{} 139 expose.Proto = types.ParseProtocol(port.Proto()) 140 expose.Port = uint16(port.Int()) 141 exposeList = append(exposeList, expose) 142 143 pb := types.PortBinding{Port: expose.Port, Proto: expose.Proto} 144 binding := bindings[port] 145 for i := 0; i < len(binding); i++ { 146 pbCopy := pb.GetCopy() 147 newP, err := nat.NewPort(nat.SplitProtoPort(binding[i].HostPort)) 148 var portStart, portEnd int 149 if err == nil { 150 portStart, portEnd, err = newP.Range() 151 } 152 if err != nil { 153 return nil, fmt.Errorf("Error parsing HostPort value(%s):%v", binding[i].HostPort, err) 154 } 155 pbCopy.HostPort = uint16(portStart) 156 pbCopy.HostPortEnd = uint16(portEnd) 157 pbCopy.HostIP = net.ParseIP(binding[i].HostIP) 158 pbList = append(pbList, pbCopy) 159 } 160 161 if container.HostConfig.PublishAllPorts && len(binding) == 0 { 162 pbList = append(pbList, pb) 163 } 164 } 165 166 sboxOptions = append(sboxOptions, 167 libnetwork.OptionPortMapping(pbList), 168 libnetwork.OptionExposedPorts(exposeList)) 169 170 // Legacy Link feature is supported only for the default bridge network. 171 // return if this call to build join options is not for default bridge network 172 // Legacy Link is only supported by docker run --link 173 bridgeSettings, ok := container.NetworkSettings.Networks[defaultNetName] 174 if !ok || bridgeSettings.EndpointSettings == nil { 175 return sboxOptions, nil 176 } 177 178 if bridgeSettings.EndpointID == "" { 179 return sboxOptions, nil 180 } 181 182 var ( 183 childEndpoints, parentEndpoints []string 184 cEndpointID string 185 ) 186 187 children := daemon.children(container) 188 for linkAlias, child := range children { 189 if !isLinkable(child) { 190 return nil, fmt.Errorf("Cannot link to %s, as it does not belong to the default network", child.Name) 191 } 192 _, alias := path.Split(linkAlias) 193 // allow access to the linked container via the alias, real name, and container hostname 194 aliasList := alias + " " + child.Config.Hostname 195 // only add the name if alias isn't equal to the name 196 if alias != child.Name[1:] { 197 aliasList = aliasList + " " + child.Name[1:] 198 } 199 sboxOptions = append(sboxOptions, libnetwork.OptionExtraHost(aliasList, child.NetworkSettings.Networks[defaultNetName].IPAddress)) 200 cEndpointID = child.NetworkSettings.Networks[defaultNetName].EndpointID 201 if cEndpointID != "" { 202 childEndpoints = append(childEndpoints, cEndpointID) 203 } 204 } 205 206 for alias, parent := range daemon.parents(container) { 207 if daemon.configStore.DisableBridge || !container.HostConfig.NetworkMode.IsPrivate() { 208 continue 209 } 210 211 _, alias = path.Split(alias) 212 logrus.Debugf("Update /etc/hosts of %s for alias %s with ip %s", parent.ID, alias, bridgeSettings.IPAddress) 213 sboxOptions = append(sboxOptions, libnetwork.OptionParentUpdate( 214 parent.ID, 215 alias, 216 bridgeSettings.IPAddress, 217 )) 218 if cEndpointID != "" { 219 parentEndpoints = append(parentEndpoints, cEndpointID) 220 } 221 } 222 223 linkOptions := options.Generic{ 224 netlabel.GenericData: options.Generic{ 225 "ParentEndpoints": parentEndpoints, 226 "ChildEndpoints": childEndpoints, 227 }, 228 } 229 230 sboxOptions = append(sboxOptions, libnetwork.OptionGeneric(linkOptions)) 231 return sboxOptions, nil 232 } 233 234 func (daemon *Daemon) updateNetworkSettings(container *container.Container, n libnetwork.Network, endpointConfig *networktypes.EndpointSettings) error { 235 if container.NetworkSettings == nil { 236 container.NetworkSettings = &network.Settings{Networks: make(map[string]*network.EndpointSettings)} 237 } 238 239 if !container.HostConfig.NetworkMode.IsHost() && containertypes.NetworkMode(n.Type()).IsHost() { 240 return runconfig.ErrConflictHostNetwork 241 } 242 243 for s := range container.NetworkSettings.Networks { 244 sn, err := daemon.FindNetwork(s) 245 if err != nil { 246 continue 247 } 248 249 if sn.Name() == n.Name() { 250 // Avoid duplicate config 251 return nil 252 } 253 if !containertypes.NetworkMode(sn.Type()).IsPrivate() || 254 !containertypes.NetworkMode(n.Type()).IsPrivate() { 255 return runconfig.ErrConflictSharedNetwork 256 } 257 if containertypes.NetworkMode(sn.Name()).IsNone() || 258 containertypes.NetworkMode(n.Name()).IsNone() { 259 return runconfig.ErrConflictNoNetwork 260 } 261 } 262 263 if _, ok := container.NetworkSettings.Networks[n.Name()]; !ok { 264 container.NetworkSettings.Networks[n.Name()] = &network.EndpointSettings{ 265 EndpointSettings: endpointConfig, 266 } 267 } 268 269 return nil 270 } 271 272 func (daemon *Daemon) updateEndpointNetworkSettings(container *container.Container, n libnetwork.Network, ep libnetwork.Endpoint) error { 273 if err := container.BuildEndpointInfo(n, ep); err != nil { 274 return err 275 } 276 277 if container.HostConfig.NetworkMode == runconfig.DefaultDaemonNetworkMode() { 278 container.NetworkSettings.Bridge = daemon.configStore.bridgeConfig.Iface 279 } 280 281 return nil 282 } 283 284 // UpdateNetwork is used to update the container's network (e.g. when linked containers 285 // get removed/unlinked). 286 func (daemon *Daemon) updateNetwork(container *container.Container) error { 287 ctrl := daemon.netController 288 sid := container.NetworkSettings.SandboxID 289 290 sb, err := ctrl.SandboxByID(sid) 291 if err != nil { 292 return fmt.Errorf("error locating sandbox id %s: %v", sid, err) 293 } 294 295 // Find if container is connected to the default bridge network 296 var n libnetwork.Network 297 for name := range container.NetworkSettings.Networks { 298 sn, err := daemon.FindNetwork(name) 299 if err != nil { 300 continue 301 } 302 if sn.Name() == runconfig.DefaultDaemonNetworkMode().NetworkName() { 303 n = sn 304 break 305 } 306 } 307 308 if n == nil { 309 // Not connected to the default bridge network; Nothing to do 310 return nil 311 } 312 313 options, err := daemon.buildSandboxOptions(container) 314 if err != nil { 315 return fmt.Errorf("Update network failed: %v", err) 316 } 317 318 if err := sb.Refresh(options...); err != nil { 319 return fmt.Errorf("Update network failed: Failure in refresh sandbox %s: %v", sid, err) 320 } 321 322 return nil 323 } 324 325 func (daemon *Daemon) findAndAttachNetwork(container *container.Container, idOrName string, epConfig *networktypes.EndpointSettings) (libnetwork.Network, *networktypes.NetworkingConfig, error) { 326 n, err := daemon.FindNetwork(idOrName) 327 if err != nil { 328 // We should always be able to find the network for a 329 // managed container. 330 if container.Managed { 331 return nil, nil, err 332 } 333 } 334 335 // If we found a network and if it is not dynamically created 336 // we should never attempt to attach to that network here. 337 if n != nil { 338 if container.Managed || !n.Info().Dynamic() { 339 return n, nil, nil 340 } 341 } 342 343 var addresses []string 344 if epConfig != nil && epConfig.IPAMConfig != nil { 345 if epConfig.IPAMConfig.IPv4Address != "" { 346 addresses = append(addresses, epConfig.IPAMConfig.IPv4Address) 347 } 348 349 if epConfig.IPAMConfig.IPv6Address != "" { 350 addresses = append(addresses, epConfig.IPAMConfig.IPv6Address) 351 } 352 } 353 354 // In all other cases, attempt to attach to the network to 355 // trigger attachment in the swarm cluster manager. 356 var config *networktypes.NetworkingConfig 357 if daemon.clusterProvider != nil { 358 var err error 359 config, err = daemon.clusterProvider.AttachNetwork(idOrName, container.ID, addresses) 360 if err != nil { 361 return nil, nil, err 362 } 363 } 364 365 n, err = daemon.FindNetwork(idOrName) 366 if err != nil { 367 if daemon.clusterProvider != nil { 368 if err := daemon.clusterProvider.DetachNetwork(idOrName, container.ID); err != nil { 369 logrus.Warnf("Could not rollback attachment for container %s to network %s: %v", container.ID, idOrName, err) 370 } 371 } 372 373 return nil, nil, err 374 } 375 376 // This container has attachment to a swarm scope 377 // network. Update the container network settings accordingly. 378 container.NetworkSettings.HasSwarmEndpoint = true 379 return n, config, nil 380 } 381 382 // updateContainerNetworkSettings update the network settings 383 func (daemon *Daemon) updateContainerNetworkSettings(container *container.Container, endpointsConfig map[string]*networktypes.EndpointSettings) { 384 var n libnetwork.Network 385 386 mode := container.HostConfig.NetworkMode 387 if container.Config.NetworkDisabled || mode.IsContainer() { 388 return 389 } 390 391 networkName := mode.NetworkName() 392 if mode.IsDefault() { 393 networkName = daemon.netController.Config().Daemon.DefaultNetwork 394 } 395 396 if mode.IsUserDefined() { 397 var err error 398 399 n, err = daemon.FindNetwork(networkName) 400 if err == nil { 401 networkName = n.Name() 402 } 403 } 404 405 if container.NetworkSettings == nil { 406 container.NetworkSettings = &network.Settings{} 407 } 408 409 if len(endpointsConfig) > 0 { 410 if container.NetworkSettings.Networks == nil { 411 container.NetworkSettings.Networks = make(map[string]*network.EndpointSettings) 412 } 413 414 for name, epConfig := range endpointsConfig { 415 container.NetworkSettings.Networks[name] = &network.EndpointSettings{ 416 EndpointSettings: epConfig, 417 } 418 } 419 } 420 421 if container.NetworkSettings.Networks == nil { 422 container.NetworkSettings.Networks = make(map[string]*network.EndpointSettings) 423 container.NetworkSettings.Networks[networkName] = &network.EndpointSettings{ 424 EndpointSettings: &networktypes.EndpointSettings{}, 425 } 426 } 427 428 // Convert any settings added by client in default name to 429 // engine's default network name key 430 if mode.IsDefault() { 431 if nConf, ok := container.NetworkSettings.Networks[mode.NetworkName()]; ok { 432 container.NetworkSettings.Networks[networkName] = nConf 433 delete(container.NetworkSettings.Networks, mode.NetworkName()) 434 } 435 } 436 437 if !mode.IsUserDefined() { 438 return 439 } 440 // Make sure to internally store the per network endpoint config by network name 441 if _, ok := container.NetworkSettings.Networks[networkName]; ok { 442 return 443 } 444 445 if n != nil { 446 if nwConfig, ok := container.NetworkSettings.Networks[n.ID()]; ok { 447 container.NetworkSettings.Networks[networkName] = nwConfig 448 delete(container.NetworkSettings.Networks, n.ID()) 449 return 450 } 451 } 452 } 453 454 func (daemon *Daemon) allocateNetwork(container *container.Container) error { 455 controller := daemon.netController 456 457 if daemon.netController == nil { 458 return nil 459 } 460 461 // Cleanup any stale sandbox left over due to ungraceful daemon shutdown 462 if err := controller.SandboxDestroy(container.ID); err != nil { 463 logrus.Errorf("failed to cleanup up stale network sandbox for container %s", container.ID) 464 } 465 466 updateSettings := false 467 if len(container.NetworkSettings.Networks) == 0 { 468 if container.Config.NetworkDisabled || container.HostConfig.NetworkMode.IsContainer() { 469 return nil 470 } 471 472 daemon.updateContainerNetworkSettings(container, nil) 473 updateSettings = true 474 } 475 476 // always connect default network first since only default 477 // network mode support link and we need do some setting 478 // on sandbox initialize for link, but the sandbox only be initialized 479 // on first network connecting. 480 defaultNetName := runconfig.DefaultDaemonNetworkMode().NetworkName() 481 if nConf, ok := container.NetworkSettings.Networks[defaultNetName]; ok { 482 cleanOperationalData(nConf) 483 if err := daemon.connectToNetwork(container, defaultNetName, nConf.EndpointSettings, updateSettings); err != nil { 484 return err 485 } 486 487 } 488 489 // the intermediate map is necessary because "connectToNetwork" modifies "container.NetworkSettings.Networks" 490 networks := make(map[string]*network.EndpointSettings) 491 for n, epConf := range container.NetworkSettings.Networks { 492 if n == defaultNetName { 493 continue 494 } 495 496 networks[n] = epConf 497 } 498 499 for netName, epConf := range networks { 500 cleanOperationalData(epConf) 501 if err := daemon.connectToNetwork(container, netName, epConf.EndpointSettings, updateSettings); err != nil { 502 return err 503 } 504 } 505 506 return container.WriteHostConfig() 507 } 508 509 func (daemon *Daemon) getNetworkSandbox(container *container.Container) libnetwork.Sandbox { 510 var sb libnetwork.Sandbox 511 daemon.netController.WalkSandboxes(func(s libnetwork.Sandbox) bool { 512 if s.ContainerID() == container.ID { 513 sb = s 514 return true 515 } 516 return false 517 }) 518 return sb 519 } 520 521 // hasUserDefinedIPAddress returns whether the passed endpoint configuration contains IP address configuration 522 func hasUserDefinedIPAddress(epConfig *networktypes.EndpointSettings) bool { 523 return epConfig != nil && epConfig.IPAMConfig != nil && (len(epConfig.IPAMConfig.IPv4Address) > 0 || len(epConfig.IPAMConfig.IPv6Address) > 0) 524 } 525 526 // User specified ip address is acceptable only for networks with user specified subnets. 527 func validateNetworkingConfig(n libnetwork.Network, epConfig *networktypes.EndpointSettings) error { 528 if n == nil || epConfig == nil { 529 return nil 530 } 531 if !hasUserDefinedIPAddress(epConfig) { 532 return nil 533 } 534 _, _, nwIPv4Configs, nwIPv6Configs := n.Info().IpamConfig() 535 for _, s := range []struct { 536 ipConfigured bool 537 subnetConfigs []*libnetwork.IpamConf 538 }{ 539 { 540 ipConfigured: len(epConfig.IPAMConfig.IPv4Address) > 0, 541 subnetConfigs: nwIPv4Configs, 542 }, 543 { 544 ipConfigured: len(epConfig.IPAMConfig.IPv6Address) > 0, 545 subnetConfigs: nwIPv6Configs, 546 }, 547 } { 548 if s.ipConfigured { 549 foundSubnet := false 550 for _, cfg := range s.subnetConfigs { 551 if len(cfg.PreferredPool) > 0 { 552 foundSubnet = true 553 break 554 } 555 } 556 if !foundSubnet { 557 return runconfig.ErrUnsupportedNetworkNoSubnetAndIP 558 } 559 } 560 } 561 562 return nil 563 } 564 565 // cleanOperationalData resets the operational data from the passed endpoint settings 566 func cleanOperationalData(es *network.EndpointSettings) { 567 es.EndpointID = "" 568 es.Gateway = "" 569 es.IPAddress = "" 570 es.IPPrefixLen = 0 571 es.IPv6Gateway = "" 572 es.GlobalIPv6Address = "" 573 es.GlobalIPv6PrefixLen = 0 574 es.MacAddress = "" 575 if es.IPAMOperational { 576 es.IPAMConfig = nil 577 } 578 } 579 580 func (daemon *Daemon) updateNetworkConfig(container *container.Container, n libnetwork.Network, endpointConfig *networktypes.EndpointSettings, updateSettings bool) error { 581 582 if !containertypes.NetworkMode(n.Name()).IsUserDefined() { 583 if hasUserDefinedIPAddress(endpointConfig) && !enableIPOnPredefinedNetwork() { 584 return runconfig.ErrUnsupportedNetworkAndIP 585 } 586 if endpointConfig != nil && len(endpointConfig.Aliases) > 0 && !container.EnableServiceDiscoveryOnDefaultNetwork() { 587 return runconfig.ErrUnsupportedNetworkAndAlias 588 } 589 } else { 590 addShortID := true 591 shortID := stringid.TruncateID(container.ID) 592 for _, alias := range endpointConfig.Aliases { 593 if alias == shortID { 594 addShortID = false 595 break 596 } 597 } 598 if addShortID { 599 endpointConfig.Aliases = append(endpointConfig.Aliases, shortID) 600 } 601 } 602 603 if err := validateNetworkingConfig(n, endpointConfig); err != nil { 604 return err 605 } 606 607 if updateSettings { 608 if err := daemon.updateNetworkSettings(container, n, endpointConfig); err != nil { 609 return err 610 } 611 } 612 return nil 613 } 614 615 func (daemon *Daemon) connectToNetwork(container *container.Container, idOrName string, endpointConfig *networktypes.EndpointSettings, updateSettings bool) (err error) { 616 if container.HostConfig.NetworkMode.IsContainer() { 617 return runconfig.ErrConflictSharedNetwork 618 } 619 620 if containertypes.NetworkMode(idOrName).IsBridge() && 621 daemon.configStore.DisableBridge { 622 container.Config.NetworkDisabled = true 623 return nil 624 } 625 626 if endpointConfig == nil { 627 endpointConfig = &networktypes.EndpointSettings{} 628 } 629 630 n, config, err := daemon.findAndAttachNetwork(container, idOrName, endpointConfig) 631 if err != nil { 632 return err 633 } 634 if n == nil { 635 return nil 636 } 637 638 var operIPAM bool 639 if config != nil { 640 if epConfig, ok := config.EndpointsConfig[n.Name()]; ok { 641 if endpointConfig.IPAMConfig == nil || 642 (endpointConfig.IPAMConfig.IPv4Address == "" && 643 endpointConfig.IPAMConfig.IPv6Address == "" && 644 len(endpointConfig.IPAMConfig.LinkLocalIPs) == 0) { 645 operIPAM = true 646 } 647 648 endpointConfig = epConfig 649 } 650 } 651 652 err = daemon.updateNetworkConfig(container, n, endpointConfig, updateSettings) 653 if err != nil { 654 return err 655 } 656 657 controller := daemon.netController 658 sb := daemon.getNetworkSandbox(container) 659 createOptions, err := container.BuildCreateEndpointOptions(n, endpointConfig, sb, daemon.configStore.DNS) 660 if err != nil { 661 return err 662 } 663 664 endpointName := strings.TrimPrefix(container.Name, "/") 665 ep, err := n.CreateEndpoint(endpointName, createOptions...) 666 if err != nil { 667 return err 668 } 669 defer func() { 670 if err != nil { 671 if e := ep.Delete(false); e != nil { 672 logrus.Warnf("Could not rollback container connection to network %s", idOrName) 673 } 674 } 675 }() 676 container.NetworkSettings.Networks[n.Name()] = &network.EndpointSettings{ 677 EndpointSettings: endpointConfig, 678 IPAMOperational: operIPAM, 679 } 680 if _, ok := container.NetworkSettings.Networks[n.ID()]; ok { 681 delete(container.NetworkSettings.Networks, n.ID()) 682 } 683 684 if err := daemon.updateEndpointNetworkSettings(container, n, ep); err != nil { 685 return err 686 } 687 688 if sb == nil { 689 options, err := daemon.buildSandboxOptions(container) 690 if err != nil { 691 return err 692 } 693 sb, err = controller.NewSandbox(container.ID, options...) 694 if err != nil { 695 return err 696 } 697 698 container.UpdateSandboxNetworkSettings(sb) 699 } 700 701 joinOptions, err := container.BuildJoinOptions(n) 702 if err != nil { 703 return err 704 } 705 706 if err := ep.Join(sb, joinOptions...); err != nil { 707 return err 708 } 709 710 if err := container.UpdateJoinInfo(n, ep); err != nil { 711 return fmt.Errorf("Updating join info failed: %v", err) 712 } 713 714 container.NetworkSettings.Ports = getPortMapInfo(sb) 715 716 daemon.LogNetworkEventWithAttributes(n, "connect", map[string]string{"container": container.ID}) 717 return nil 718 } 719 720 // ForceEndpointDelete deletes an endpoint from a network forcefully 721 func (daemon *Daemon) ForceEndpointDelete(name string, networkName string) error { 722 n, err := daemon.FindNetwork(networkName) 723 if err != nil { 724 return err 725 } 726 727 ep, err := n.EndpointByName(name) 728 if err != nil { 729 return err 730 } 731 return ep.Delete(true) 732 } 733 734 func (daemon *Daemon) disconnectFromNetwork(container *container.Container, n libnetwork.Network, force bool) error { 735 var ( 736 ep libnetwork.Endpoint 737 sbox libnetwork.Sandbox 738 ) 739 740 s := func(current libnetwork.Endpoint) bool { 741 epInfo := current.Info() 742 if epInfo == nil { 743 return false 744 } 745 if sb := epInfo.Sandbox(); sb != nil { 746 if sb.ContainerID() == container.ID { 747 ep = current 748 sbox = sb 749 return true 750 } 751 } 752 return false 753 } 754 n.WalkEndpoints(s) 755 756 if ep == nil && force { 757 epName := strings.TrimPrefix(container.Name, "/") 758 ep, err := n.EndpointByName(epName) 759 if err != nil { 760 return err 761 } 762 return ep.Delete(force) 763 } 764 765 if ep == nil { 766 return fmt.Errorf("container %s is not connected to the network", container.ID) 767 } 768 769 if err := ep.Leave(sbox); err != nil { 770 return fmt.Errorf("container %s failed to leave network %s: %v", container.ID, n.Name(), err) 771 } 772 773 container.NetworkSettings.Ports = getPortMapInfo(sbox) 774 775 if err := ep.Delete(false); err != nil { 776 return fmt.Errorf("endpoint delete failed for container %s on network %s: %v", container.ID, n.Name(), err) 777 } 778 779 delete(container.NetworkSettings.Networks, n.Name()) 780 781 if daemon.clusterProvider != nil && n.Info().Dynamic() && !container.Managed { 782 if err := daemon.clusterProvider.DetachNetwork(n.Name(), container.ID); err != nil { 783 logrus.Warnf("error detaching from network %s: %v", n, err) 784 } 785 } 786 787 return nil 788 } 789 790 func (daemon *Daemon) initializeNetworking(container *container.Container) error { 791 var err error 792 793 if container.HostConfig.NetworkMode.IsContainer() { 794 // we need to get the hosts files from the container to join 795 nc, err := daemon.getNetworkedContainer(container.ID, container.HostConfig.NetworkMode.ConnectedContainer()) 796 if err != nil { 797 return err 798 } 799 initializeNetworkingPaths(container, nc) 800 container.Config.Hostname = nc.Config.Hostname 801 container.Config.Domainname = nc.Config.Domainname 802 return nil 803 } 804 805 if container.HostConfig.NetworkMode.IsHost() { 806 container.Config.Hostname, err = os.Hostname() 807 if err != nil { 808 return err 809 } 810 } 811 812 if err := daemon.allocateNetwork(container); err != nil { 813 return err 814 } 815 816 return container.BuildHostnameFile() 817 } 818 819 func (daemon *Daemon) getNetworkedContainer(containerID, connectedContainerID string) (*container.Container, error) { 820 nc, err := daemon.GetContainer(connectedContainerID) 821 if err != nil { 822 return nil, err 823 } 824 if containerID == nc.ID { 825 return nil, fmt.Errorf("cannot join own network") 826 } 827 if !nc.IsRunning() { 828 err := fmt.Errorf("cannot join network of a non running container: %s", connectedContainerID) 829 return nil, derr.NewRequestConflictError(err) 830 } 831 if nc.IsRestarting() { 832 return nil, errContainerIsRestarting(connectedContainerID) 833 } 834 return nc, nil 835 } 836 837 func (daemon *Daemon) releaseNetwork(container *container.Container) { 838 if daemon.netController == nil { 839 return 840 } 841 if container.HostConfig.NetworkMode.IsContainer() || container.Config.NetworkDisabled { 842 return 843 } 844 845 sid := container.NetworkSettings.SandboxID 846 settings := container.NetworkSettings.Networks 847 container.NetworkSettings.Ports = nil 848 849 if sid == "" || len(settings) == 0 { 850 return 851 } 852 853 var networks []libnetwork.Network 854 for n, epSettings := range settings { 855 if nw, err := daemon.FindNetwork(n); err == nil { 856 networks = append(networks, nw) 857 } 858 859 if epSettings.EndpointSettings == nil { 860 continue 861 } 862 863 cleanOperationalData(epSettings) 864 } 865 866 sb, err := daemon.netController.SandboxByID(sid) 867 if err != nil { 868 logrus.Warnf("error locating sandbox id %s: %v", sid, err) 869 return 870 } 871 872 if err := sb.Delete(); err != nil { 873 logrus.Errorf("Error deleting sandbox id %s for container %s: %v", sid, container.ID, err) 874 } 875 876 for _, nw := range networks { 877 if daemon.clusterProvider != nil && nw.Info().Dynamic() && !container.Managed { 878 if err := daemon.clusterProvider.DetachNetwork(nw.Name(), container.ID); err != nil { 879 logrus.Warnf("error detaching from network %s: %v", nw.Name(), err) 880 } 881 } 882 883 attributes := map[string]string{ 884 "container": container.ID, 885 } 886 daemon.LogNetworkEventWithAttributes(nw, "disconnect", attributes) 887 } 888 } 889 890 func errRemovalContainer(containerID string) error { 891 return fmt.Errorf("Container %s is marked for removal and cannot be connected or disconnected to the network", containerID) 892 } 893 894 // ConnectToNetwork connects a container to a network 895 func (daemon *Daemon) ConnectToNetwork(container *container.Container, idOrName string, endpointConfig *networktypes.EndpointSettings) error { 896 if endpointConfig == nil { 897 endpointConfig = &networktypes.EndpointSettings{} 898 } 899 if !container.Running { 900 if container.RemovalInProgress || container.Dead { 901 return errRemovalContainer(container.ID) 902 } 903 904 n, err := daemon.FindNetwork(idOrName) 905 if err == nil && n != nil { 906 if err := daemon.updateNetworkConfig(container, n, endpointConfig, true); err != nil { 907 return err 908 } 909 } else { 910 container.NetworkSettings.Networks[idOrName] = &network.EndpointSettings{ 911 EndpointSettings: endpointConfig, 912 } 913 } 914 } else if !daemon.isNetworkHotPluggable() { 915 return fmt.Errorf(runtime.GOOS + " does not support connecting a running container to a network") 916 } else { 917 if err := daemon.connectToNetwork(container, idOrName, endpointConfig, true); err != nil { 918 return err 919 } 920 } 921 if err := container.ToDiskLocking(); err != nil { 922 return fmt.Errorf("Error saving container to disk: %v", err) 923 } 924 return nil 925 } 926 927 // DisconnectFromNetwork disconnects container from network n. 928 func (daemon *Daemon) DisconnectFromNetwork(container *container.Container, networkName string, force bool) error { 929 n, err := daemon.FindNetwork(networkName) 930 if !container.Running || (err != nil && force) { 931 if container.RemovalInProgress || container.Dead { 932 return errRemovalContainer(container.ID) 933 } 934 // In case networkName is resolved we will use n.Name() 935 // this will cover the case where network id is passed. 936 if n != nil { 937 networkName = n.Name() 938 } 939 if _, ok := container.NetworkSettings.Networks[networkName]; !ok { 940 return fmt.Errorf("container %s is not connected to the network %s", container.ID, networkName) 941 } 942 delete(container.NetworkSettings.Networks, networkName) 943 } else if err == nil && !daemon.isNetworkHotPluggable() { 944 return fmt.Errorf(runtime.GOOS + " does not support connecting a running container to a network") 945 } else if err == nil { 946 if container.HostConfig.NetworkMode.IsHost() && containertypes.NetworkMode(n.Type()).IsHost() { 947 return runconfig.ErrConflictHostNetwork 948 } 949 950 if err := daemon.disconnectFromNetwork(container, n, false); err != nil { 951 return err 952 } 953 } else { 954 return err 955 } 956 957 if err := container.ToDiskLocking(); err != nil { 958 return fmt.Errorf("Error saving container to disk: %v", err) 959 } 960 961 if n != nil { 962 attributes := map[string]string{ 963 "container": container.ID, 964 } 965 daemon.LogNetworkEventWithAttributes(n, "disconnect", attributes) 966 } 967 return nil 968 }