mirror of
https://github.com/containers/podman.git
synced 2025-05-17 23:26:08 +08:00
libpod: Move getContainerNetworkInfo to networking_common.go
[NO NEW TESTS NEEDED] Signed-off-by: Doug Rabson <dfr@rabson.org>
This commit is contained in:
@ -197,3 +197,107 @@ func (r *Runtime) reloadContainerNetwork(ctr *Container) (map[string]types.Statu
|
|||||||
|
|
||||||
return r.configureNetNS(ctr, ctr.state.NetNS)
|
return r.configureNetNS(ctr, ctr.state.NetNS)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Produce an InspectNetworkSettings containing information on the container
|
||||||
|
// network.
|
||||||
|
func (c *Container) getContainerNetworkInfo() (*define.InspectNetworkSettings, error) {
|
||||||
|
if c.config.NetNsCtr != "" {
|
||||||
|
netNsCtr, err := c.runtime.GetContainer(c.config.NetNsCtr)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
// see https://github.com/containers/podman/issues/10090
|
||||||
|
// the container has to be locked for syncContainer()
|
||||||
|
netNsCtr.lock.Lock()
|
||||||
|
defer netNsCtr.lock.Unlock()
|
||||||
|
// Have to sync to ensure that state is populated
|
||||||
|
if err := netNsCtr.syncContainer(); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
logrus.Debugf("Container %s shares network namespace, retrieving network info of container %s", c.ID(), c.config.NetNsCtr)
|
||||||
|
|
||||||
|
return netNsCtr.getContainerNetworkInfo()
|
||||||
|
}
|
||||||
|
|
||||||
|
settings := new(define.InspectNetworkSettings)
|
||||||
|
settings.Ports = makeInspectPortBindings(c.config.PortMappings, c.config.ExposedPorts)
|
||||||
|
|
||||||
|
networks, err := c.networks()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if c.state.NetNS == nil {
|
||||||
|
if networkNSPath := c.joinedNetworkNSPath(); networkNSPath != "" {
|
||||||
|
if result, err := c.inspectJoinedNetworkNS(networkNSPath); err == nil {
|
||||||
|
// fallback to dummy configuration
|
||||||
|
settings.InspectBasicNetworkConfig = resultToBasicNetworkConfig(result)
|
||||||
|
return settings, nil
|
||||||
|
}
|
||||||
|
// do not propagate error inspecting a joined network ns
|
||||||
|
logrus.Errorf("Inspecting network namespace: %s of container %s: %v", networkNSPath, c.ID(), err)
|
||||||
|
}
|
||||||
|
// We can't do more if the network is down.
|
||||||
|
|
||||||
|
// We still want to make dummy configurations for each CNI net
|
||||||
|
// the container joined.
|
||||||
|
if len(networks) > 0 {
|
||||||
|
settings.Networks = make(map[string]*define.InspectAdditionalNetwork, len(networks))
|
||||||
|
for net, opts := range networks {
|
||||||
|
cniNet := new(define.InspectAdditionalNetwork)
|
||||||
|
cniNet.NetworkID = net
|
||||||
|
cniNet.Aliases = opts.Aliases
|
||||||
|
settings.Networks[net] = cniNet
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return settings, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set network namespace path
|
||||||
|
settings.SandboxKey = c.state.NetNS.Path()
|
||||||
|
|
||||||
|
netStatus := c.getNetworkStatus()
|
||||||
|
// If this is empty, we're probably slirp4netns
|
||||||
|
if len(netStatus) == 0 {
|
||||||
|
return settings, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// If we have networks - handle that here
|
||||||
|
if len(networks) > 0 {
|
||||||
|
if len(networks) != len(netStatus) {
|
||||||
|
return nil, fmt.Errorf("network inspection mismatch: asked to join %d network(s) %v, but have information on %d network(s): %w", len(networks), networks, len(netStatus), define.ErrInternal)
|
||||||
|
}
|
||||||
|
|
||||||
|
settings.Networks = make(map[string]*define.InspectAdditionalNetwork)
|
||||||
|
|
||||||
|
for name, opts := range networks {
|
||||||
|
result := netStatus[name]
|
||||||
|
addedNet := new(define.InspectAdditionalNetwork)
|
||||||
|
addedNet.NetworkID = name
|
||||||
|
addedNet.Aliases = opts.Aliases
|
||||||
|
addedNet.InspectBasicNetworkConfig = resultToBasicNetworkConfig(result)
|
||||||
|
|
||||||
|
settings.Networks[name] = addedNet
|
||||||
|
}
|
||||||
|
|
||||||
|
// if not only the default network is connected we can return here
|
||||||
|
// otherwise we have to populate the InspectBasicNetworkConfig settings
|
||||||
|
_, isDefaultNet := networks[c.runtime.config.Network.DefaultNetwork]
|
||||||
|
if !(len(networks) == 1 && isDefaultNet) {
|
||||||
|
return settings, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// If not joining networks, we should have at most 1 result
|
||||||
|
if len(netStatus) > 1 {
|
||||||
|
return nil, fmt.Errorf("should have at most 1 network status result if not joining networks, instead got %d: %w", len(netStatus), define.ErrInternal)
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(netStatus) == 1 {
|
||||||
|
for _, status := range netStatus {
|
||||||
|
settings.InspectBasicNetworkConfig = resultToBasicNetworkConfig(status)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return settings, nil
|
||||||
|
}
|
||||||
|
@ -249,84 +249,6 @@ func getContainerNetIO(ctr *Container) (*LinkStatistics64, error) {
|
|||||||
return &LinkStatistics64{}, nil
|
return &LinkStatistics64{}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Produce an InspectNetworkSettings containing information on the container
|
|
||||||
// network.
|
|
||||||
func (c *Container) getContainerNetworkInfo() (*define.InspectNetworkSettings, error) {
|
|
||||||
if c.config.NetNsCtr != "" {
|
|
||||||
netNsCtr, err := c.runtime.GetContainer(c.config.NetNsCtr)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
// see https://github.com/containers/podman/issues/10090
|
|
||||||
// the container has to be locked for syncContainer()
|
|
||||||
netNsCtr.lock.Lock()
|
|
||||||
defer netNsCtr.lock.Unlock()
|
|
||||||
// Have to sync to ensure that state is populated
|
|
||||||
if err := netNsCtr.syncContainer(); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
logrus.Debugf("Container %s shares network namespace, retrieving network info of container %s", c.ID(), c.config.NetNsCtr)
|
|
||||||
|
|
||||||
return netNsCtr.getContainerNetworkInfo()
|
|
||||||
}
|
|
||||||
|
|
||||||
settings := new(define.InspectNetworkSettings)
|
|
||||||
settings.Ports = makeInspectPortBindings(c.config.PortMappings, c.config.ExposedPorts)
|
|
||||||
|
|
||||||
networks, err := c.networks()
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
netStatus := c.getNetworkStatus()
|
|
||||||
// If this is empty, we're probably slirp4netns
|
|
||||||
if len(netStatus) == 0 {
|
|
||||||
return settings, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// If we have networks - handle that here
|
|
||||||
if len(networks) > 0 {
|
|
||||||
if len(networks) != len(netStatus) {
|
|
||||||
return nil, fmt.Errorf("network inspection mismatch: asked to join %d network(s) %v, but have information on %d network(s): %w", len(networks), networks, len(netStatus), define.ErrInternal)
|
|
||||||
}
|
|
||||||
|
|
||||||
settings.Networks = make(map[string]*define.InspectAdditionalNetwork)
|
|
||||||
|
|
||||||
for name, opts := range networks {
|
|
||||||
result := netStatus[name]
|
|
||||||
addedNet := new(define.InspectAdditionalNetwork)
|
|
||||||
addedNet.NetworkID = name
|
|
||||||
|
|
||||||
basicConfig := resultToBasicNetworkConfig(result)
|
|
||||||
addedNet.Aliases = opts.Aliases
|
|
||||||
|
|
||||||
addedNet.InspectBasicNetworkConfig = basicConfig
|
|
||||||
|
|
||||||
settings.Networks[name] = addedNet
|
|
||||||
}
|
|
||||||
|
|
||||||
// if not only the default network is connected we can return here
|
|
||||||
// otherwise we have to populate the InspectBasicNetworkConfig settings
|
|
||||||
_, isDefaultNet := networks[c.runtime.config.Network.DefaultNetwork]
|
|
||||||
if !(len(networks) == 1 && isDefaultNet) {
|
|
||||||
return settings, nil
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// If not joining networks, we should have at most 1 result
|
|
||||||
if len(netStatus) > 1 {
|
|
||||||
return nil, fmt.Errorf("should have at most 1 network status result if not joining networks, instead got %d: %w", len(netStatus), define.ErrInternal)
|
|
||||||
}
|
|
||||||
|
|
||||||
if len(netStatus) == 1 {
|
|
||||||
for _, status := range netStatus {
|
|
||||||
basicConfig := resultToBasicNetworkConfig(status)
|
|
||||||
settings.InspectBasicNetworkConfig = basicConfig
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return settings, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// resultToBasicNetworkConfig produces an InspectBasicNetworkConfig from a CNI
|
// resultToBasicNetworkConfig produces an InspectBasicNetworkConfig from a CNI
|
||||||
// result
|
// result
|
||||||
func resultToBasicNetworkConfig(result types.StatusBlock) define.InspectBasicNetworkConfig {
|
func resultToBasicNetworkConfig(result types.StatusBlock) define.InspectBasicNetworkConfig {
|
||||||
|
@ -794,110 +794,6 @@ func getContainerNetIO(ctr *Container) (*netlink.LinkStatistics, error) {
|
|||||||
return netStats, err
|
return netStats, err
|
||||||
}
|
}
|
||||||
|
|
||||||
// Produce an InspectNetworkSettings containing information on the container
|
|
||||||
// network.
|
|
||||||
func (c *Container) getContainerNetworkInfo() (*define.InspectNetworkSettings, error) {
|
|
||||||
if c.config.NetNsCtr != "" {
|
|
||||||
netNsCtr, err := c.runtime.GetContainer(c.config.NetNsCtr)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
// see https://github.com/containers/podman/issues/10090
|
|
||||||
// the container has to be locked for syncContainer()
|
|
||||||
netNsCtr.lock.Lock()
|
|
||||||
defer netNsCtr.lock.Unlock()
|
|
||||||
// Have to sync to ensure that state is populated
|
|
||||||
if err := netNsCtr.syncContainer(); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
logrus.Debugf("Container %s shares network namespace, retrieving network info of container %s", c.ID(), c.config.NetNsCtr)
|
|
||||||
|
|
||||||
return netNsCtr.getContainerNetworkInfo()
|
|
||||||
}
|
|
||||||
|
|
||||||
settings := new(define.InspectNetworkSettings)
|
|
||||||
settings.Ports = makeInspectPortBindings(c.config.PortMappings, c.config.ExposedPorts)
|
|
||||||
|
|
||||||
networks, err := c.networks()
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
if c.state.NetNS == nil {
|
|
||||||
if networkNSPath := c.joinedNetworkNSPath(); networkNSPath != "" {
|
|
||||||
if result, err := c.inspectJoinedNetworkNS(networkNSPath); err == nil {
|
|
||||||
// fallback to dummy configuration
|
|
||||||
settings.InspectBasicNetworkConfig = resultToBasicNetworkConfig(result)
|
|
||||||
return settings, nil
|
|
||||||
}
|
|
||||||
// do not propagate error inspecting a joined network ns
|
|
||||||
logrus.Errorf("Inspecting network namespace: %s of container %s: %v", networkNSPath, c.ID(), err)
|
|
||||||
}
|
|
||||||
// We can't do more if the network is down.
|
|
||||||
|
|
||||||
// We still want to make dummy configurations for each CNI net
|
|
||||||
// the container joined.
|
|
||||||
if len(networks) > 0 {
|
|
||||||
settings.Networks = make(map[string]*define.InspectAdditionalNetwork, len(networks))
|
|
||||||
for net, opts := range networks {
|
|
||||||
cniNet := new(define.InspectAdditionalNetwork)
|
|
||||||
cniNet.NetworkID = net
|
|
||||||
cniNet.Aliases = opts.Aliases
|
|
||||||
settings.Networks[net] = cniNet
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return settings, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// Set network namespace path
|
|
||||||
settings.SandboxKey = c.state.NetNS.Path()
|
|
||||||
|
|
||||||
netStatus := c.getNetworkStatus()
|
|
||||||
// If this is empty, we're probably slirp4netns
|
|
||||||
if len(netStatus) == 0 {
|
|
||||||
return settings, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// If we have networks - handle that here
|
|
||||||
if len(networks) > 0 {
|
|
||||||
if len(networks) != len(netStatus) {
|
|
||||||
return nil, fmt.Errorf("network inspection mismatch: asked to join %d network(s) %v, but have information on %d network(s): %w", len(networks), networks, len(netStatus), define.ErrInternal)
|
|
||||||
}
|
|
||||||
|
|
||||||
settings.Networks = make(map[string]*define.InspectAdditionalNetwork)
|
|
||||||
|
|
||||||
for name, opts := range networks {
|
|
||||||
result := netStatus[name]
|
|
||||||
addedNet := new(define.InspectAdditionalNetwork)
|
|
||||||
addedNet.NetworkID = name
|
|
||||||
addedNet.Aliases = opts.Aliases
|
|
||||||
addedNet.InspectBasicNetworkConfig = resultToBasicNetworkConfig(result)
|
|
||||||
|
|
||||||
settings.Networks[name] = addedNet
|
|
||||||
}
|
|
||||||
|
|
||||||
// if not only the default network is connected we can return here
|
|
||||||
// otherwise we have to populate the InspectBasicNetworkConfig settings
|
|
||||||
_, isDefaultNet := networks[c.runtime.config.Network.DefaultNetwork]
|
|
||||||
if !(len(networks) == 1 && isDefaultNet) {
|
|
||||||
return settings, nil
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// If not joining networks, we should have at most 1 result
|
|
||||||
if len(netStatus) > 1 {
|
|
||||||
return nil, fmt.Errorf("should have at most 1 network status result if not joining networks, instead got %d: %w", len(netStatus), define.ErrInternal)
|
|
||||||
}
|
|
||||||
|
|
||||||
if len(netStatus) == 1 {
|
|
||||||
for _, status := range netStatus {
|
|
||||||
settings.InspectBasicNetworkConfig = resultToBasicNetworkConfig(status)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return settings, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (c *Container) joinedNetworkNSPath() string {
|
func (c *Container) joinedNetworkNSPath() string {
|
||||||
for _, namespace := range c.config.Spec.Linux.Namespaces {
|
for _, namespace := range c.config.Spec.Linux.Namespaces {
|
||||||
if namespace.Type == specs.NetworkNamespace {
|
if namespace.Type == specs.NetworkNamespace {
|
||||||
|
Reference in New Issue
Block a user