mirror of
https://github.com/containers/podman.git
synced 2025-12-06 21:57:50 +08:00
vendor: update c/{buildah,common,image,storage} to main
Signed-off-by: Paul Holzinger <pholzing@redhat.com>
This commit is contained in:
29
vendor/github.com/containers/common/libnetwork/netavark/config.go
generated
vendored
29
vendor/github.com/containers/common/libnetwork/netavark/config.go
generated
vendored
@@ -170,7 +170,7 @@ func (n *netavarkNetwork) networkCreate(newNetwork *types.Network, defaultNet bo
|
||||
case types.BridgeNetworkDriver:
|
||||
internalutil.MapDockerBridgeDriverOptions(newNetwork)
|
||||
|
||||
var vlan int
|
||||
checkBridgeConflict := true
|
||||
// validate the given options,
|
||||
for key, value := range newNetwork.Options {
|
||||
switch key {
|
||||
@@ -181,10 +181,19 @@ func (n *netavarkNetwork) networkCreate(newNetwork *types.Network, defaultNet bo
|
||||
}
|
||||
|
||||
case types.VLANOption:
|
||||
vlan, err = internalutil.ParseVlan(value)
|
||||
_, err = internalutil.ParseVlan(value)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
// Unset used networks here to ensure that when using vlan networks
|
||||
// we do not error if the subnet is already in use on the host.
|
||||
// https://github.com/containers/podman/issues/25736
|
||||
usedNetworks = nil
|
||||
// If there is no vlan there should be no other config with the same bridge.
|
||||
// However with vlan we want to allow that so that you can have different
|
||||
// configs on the same bridge but different vlans
|
||||
// https://github.com/containers/common/issues/2095
|
||||
checkBridgeConflict = false
|
||||
|
||||
case types.IsolateOption:
|
||||
val, err := internalutil.ParseIsolate(value)
|
||||
@@ -209,7 +218,16 @@ func (n *netavarkNetwork) networkCreate(newNetwork *types.Network, defaultNet bo
|
||||
return nil, errors.New("invalid vrf name")
|
||||
}
|
||||
case types.ModeOption:
|
||||
if !slices.Contains(types.ValidBridgeModes, value) {
|
||||
switch value {
|
||||
case types.BridgeModeManaged:
|
||||
case types.BridgeModeUnmanaged:
|
||||
// Unset used networks here to ensure that when using unmanaged networks
|
||||
// we do not error if the subnet is already in use on the host.
|
||||
// https://github.com/containers/common/issues/2322
|
||||
usedNetworks = nil
|
||||
// Also make sure we don't error if the bridge name is already used as well.
|
||||
checkBridgeConflict = false
|
||||
default:
|
||||
return nil, fmt.Errorf("unknown bridge mode %q", value)
|
||||
}
|
||||
default:
|
||||
@@ -217,11 +235,6 @@ func (n *netavarkNetwork) networkCreate(newNetwork *types.Network, defaultNet bo
|
||||
}
|
||||
}
|
||||
|
||||
// If there is no vlan there should be no other config with the same bridge.
|
||||
// However with vlan we want to allow that so that you can have different
|
||||
// configs on the same bridge but different vlans
|
||||
// https://github.com/containers/common/issues/2095
|
||||
checkBridgeConflict := vlan == 0
|
||||
err = internalutil.CreateBridge(n, newNetwork, usedNetworks, n.defaultsubnetPools, checkBridgeConflict)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
|
||||
Reference in New Issue
Block a user