mirror of
https://github.com/containers/podman.git
synced 2025-11-13 09:38:05 +08:00
Vendor in containers/(storage,image, common, buildah)
Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
This commit is contained in:
39
vendor/github.com/containers/common/libnetwork/netavark/config.go
generated
vendored
39
vendor/github.com/containers/common/libnetwork/netavark/config.go
generated
vendored
@@ -5,16 +5,18 @@ package netavark
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"errors"
|
||||
"fmt"
|
||||
"net"
|
||||
"os"
|
||||
"path/filepath"
|
||||
"strconv"
|
||||
"time"
|
||||
|
||||
internalutil "github.com/containers/common/libnetwork/internal/util"
|
||||
"github.com/containers/common/libnetwork/types"
|
||||
"github.com/containers/common/pkg/util"
|
||||
"github.com/containers/storage/pkg/stringid"
|
||||
"github.com/pkg/errors"
|
||||
)
|
||||
|
||||
// NetworkCreate will take a partial filled Network and fill the
|
||||
@@ -44,7 +46,7 @@ func (n *netavarkNetwork) networkCreate(newNetwork *types.Network, defaultNet bo
|
||||
// FIXME: Should we use a different type for network create without the ID field?
|
||||
// the caller is not allowed to set a specific ID
|
||||
if newNetwork.ID != "" {
|
||||
return nil, errors.Wrap(types.ErrInvalidArg, "ID can not be set for network create")
|
||||
return nil, fmt.Errorf("ID can not be set for network create: %w", types.ErrInvalidArg)
|
||||
}
|
||||
|
||||
// generate random network ID
|
||||
@@ -95,20 +97,27 @@ func (n *netavarkNetwork) networkCreate(newNetwork *types.Network, defaultNet bo
|
||||
// validate the given options, we do not need them but just check to make sure they are valid
|
||||
for key, value := range newNetwork.Options {
|
||||
switch key {
|
||||
case "mtu":
|
||||
case types.MTUOption:
|
||||
_, err = internalutil.ParseMTU(value)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
case "vlan":
|
||||
case types.VLANOption:
|
||||
_, err = internalutil.ParseVlan(value)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
case types.IsolateOption:
|
||||
val, err := strconv.ParseBool(value)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
// rust only support "true" or "false" while go can parse 1 and 0 as well so we need to change it
|
||||
newNetwork.Options[types.IsolateOption] = strconv.FormatBool(val)
|
||||
default:
|
||||
return nil, errors.Errorf("unsupported bridge network option %s", key)
|
||||
return nil, fmt.Errorf("unsupported bridge network option %s", key)
|
||||
}
|
||||
}
|
||||
case types.MacVLANNetworkDriver:
|
||||
@@ -117,7 +126,7 @@ func (n *netavarkNetwork) networkCreate(newNetwork *types.Network, defaultNet bo
|
||||
return nil, err
|
||||
}
|
||||
default:
|
||||
return nil, errors.Wrapf(types.ErrInvalidArg, "unsupported driver %s", newNetwork.Driver)
|
||||
return nil, fmt.Errorf("unsupported driver %s: %w", newNetwork.Driver, types.ErrInvalidArg)
|
||||
}
|
||||
|
||||
// when we do not have ipam we must disable dns
|
||||
@@ -157,7 +166,7 @@ func createMacvlan(network *types.Network) error {
|
||||
return err
|
||||
}
|
||||
if !util.StringInSlice(network.NetworkInterface, interfaceNames) {
|
||||
return errors.Errorf("parent interface %s does not exist", network.NetworkInterface)
|
||||
return fmt.Errorf("parent interface %s does not exist", network.NetworkInterface)
|
||||
}
|
||||
}
|
||||
|
||||
@@ -165,29 +174,29 @@ func createMacvlan(network *types.Network) error {
|
||||
switch network.IPAMOptions[types.Driver] {
|
||||
case "":
|
||||
if len(network.Subnets) == 0 {
|
||||
return errors.Errorf("macvlan driver needs at least one subnet specified, DHCP is not yet supported with netavark")
|
||||
return fmt.Errorf("macvlan driver needs at least one subnet specified, DHCP is not yet supported with netavark")
|
||||
}
|
||||
network.IPAMOptions[types.Driver] = types.HostLocalIPAMDriver
|
||||
case types.HostLocalIPAMDriver:
|
||||
if len(network.Subnets) == 0 {
|
||||
return errors.Errorf("macvlan driver needs at least one subnet specified, when the host-local ipam driver is set")
|
||||
return fmt.Errorf("macvlan driver needs at least one subnet specified, when the host-local ipam driver is set")
|
||||
}
|
||||
}
|
||||
|
||||
// validate the given options, we do not need them but just check to make sure they are valid
|
||||
for key, value := range network.Options {
|
||||
switch key {
|
||||
case "mode":
|
||||
case types.ModeOption:
|
||||
if !util.StringInSlice(value, types.ValidMacVLANModes) {
|
||||
return errors.Errorf("unknown macvlan mode %q", value)
|
||||
return fmt.Errorf("unknown macvlan mode %q", value)
|
||||
}
|
||||
case "mtu":
|
||||
case types.MTUOption:
|
||||
_, err := internalutil.ParseMTU(value)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
default:
|
||||
return errors.Errorf("unsupported macvlan network option %s", key)
|
||||
return fmt.Errorf("unsupported macvlan network option %s", key)
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -210,7 +219,7 @@ func (n *netavarkNetwork) NetworkRemove(nameOrID string) error {
|
||||
|
||||
// Removing the default network is not allowed.
|
||||
if network.Name == n.defaultNetwork {
|
||||
return errors.Errorf("default network %s cannot be removed", n.defaultNetwork)
|
||||
return fmt.Errorf("default network %s cannot be removed", n.defaultNetwork)
|
||||
}
|
||||
|
||||
file := filepath.Join(n.networkConfigDir, network.Name+".json")
|
||||
@@ -274,7 +283,7 @@ func validateIPAMDriver(n *types.Network) error {
|
||||
case types.DHCPIPAMDriver:
|
||||
return errors.New("dhcp ipam driver is not yet supported with netavark")
|
||||
default:
|
||||
return errors.Errorf("unsupported ipam driver %q", ipamDriver)
|
||||
return fmt.Errorf("unsupported ipam driver %q", ipamDriver)
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
3
vendor/github.com/containers/common/libnetwork/netavark/exec.go
generated
vendored
3
vendor/github.com/containers/common/libnetwork/netavark/exec.go
generated
vendored
@@ -119,6 +119,9 @@ func (n *netavarkNetwork) execNetavark(args []string, stdin, result interface{})
|
||||
if logrus.IsLevelEnabled(logrus.DebugLevel) {
|
||||
cmd.Env = append(cmd.Env, "RUST_BACKTRACE=1")
|
||||
}
|
||||
if n.dnsBindPort != 0 {
|
||||
cmd.Env = append(cmd.Env, "NETAVARK_DNS_PORT="+strconv.Itoa(int(n.dnsBindPort)))
|
||||
}
|
||||
|
||||
err = cmd.Start()
|
||||
if err != nil {
|
||||
|
||||
3
vendor/github.com/containers/common/libnetwork/netavark/ipam.go
generated
vendored
3
vendor/github.com/containers/common/libnetwork/netavark/ipam.go
generated
vendored
@@ -10,7 +10,6 @@ import (
|
||||
|
||||
"github.com/containers/common/libnetwork/types"
|
||||
"github.com/containers/common/libnetwork/util"
|
||||
"github.com/pkg/errors"
|
||||
"go.etcd.io/bbolt"
|
||||
)
|
||||
|
||||
@@ -180,7 +179,7 @@ func getFreeIPFromBucket(bucket *bbolt.Bucket, subnet *types.Subnet) (net.IP, er
|
||||
lastIP, err := util.LastIPInSubnet(&subnet.Subnet.IPNet)
|
||||
// this error should never happen but lets check anyways to prevent panics
|
||||
if err != nil {
|
||||
return nil, errors.Wrap(err, "failed to get lastIP")
|
||||
return nil, fmt.Errorf("failed to get lastIP: %w", err)
|
||||
}
|
||||
// ipv4 uses the last ip in a subnet for broadcast so we cannot use it
|
||||
if util.IsIPv4(lastIP) {
|
||||
|
||||
20
vendor/github.com/containers/common/libnetwork/netavark/network.go
generated
vendored
20
vendor/github.com/containers/common/libnetwork/netavark/network.go
generated
vendored
@@ -5,6 +5,8 @@ package netavark
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"errors"
|
||||
"fmt"
|
||||
"io/ioutil"
|
||||
"os"
|
||||
"path/filepath"
|
||||
@@ -16,7 +18,6 @@ import (
|
||||
"github.com/containers/common/pkg/config"
|
||||
"github.com/containers/storage/pkg/lockfile"
|
||||
"github.com/containers/storage/pkg/unshare"
|
||||
"github.com/pkg/errors"
|
||||
"github.com/sirupsen/logrus"
|
||||
)
|
||||
|
||||
@@ -43,6 +44,9 @@ type netavarkNetwork struct {
|
||||
// defaultsubnetPools contains the subnets which must be used to allocate a free subnet by network create
|
||||
defaultsubnetPools []config.SubnetPool
|
||||
|
||||
// dnsBindPort is set the the port to pass to netavark for aardvark
|
||||
dnsBindPort uint16
|
||||
|
||||
// ipamDBPath is the path to the ip allocation bolt db
|
||||
ipamDBPath string
|
||||
|
||||
@@ -80,6 +84,9 @@ type InitConfig struct {
|
||||
// DefaultsubnetPools contains the subnets which must be used to allocate a free subnet by network create
|
||||
DefaultsubnetPools []config.SubnetPool
|
||||
|
||||
// DNSBindPort is set the the port to pass to netavark for aardvark
|
||||
DNSBindPort uint16
|
||||
|
||||
// Syslog describes whenever the netavark debbug output should be log to the syslog as well.
|
||||
// This will use logrus to do so, make sure logrus is set up to log to the syslog.
|
||||
Syslog bool
|
||||
@@ -105,7 +112,7 @@ func NewNetworkInterface(conf *InitConfig) (types.ContainerNetwork, error) {
|
||||
}
|
||||
defaultNet, err := types.ParseCIDR(defaultSubnet)
|
||||
if err != nil {
|
||||
return nil, errors.Wrap(err, "failed to parse default subnet")
|
||||
return nil, fmt.Errorf("failed to parse default subnet: %w", err)
|
||||
}
|
||||
|
||||
if err := os.MkdirAll(conf.NetworkConfigDir, 0o755); err != nil {
|
||||
@@ -131,6 +138,7 @@ func NewNetworkInterface(conf *InitConfig) (types.ContainerNetwork, error) {
|
||||
defaultNetwork: defaultNetworkName,
|
||||
defaultSubnet: defaultNet,
|
||||
defaultsubnetPools: defaultSubnetPools,
|
||||
dnsBindPort: conf.DNSBindPort,
|
||||
lock: lock,
|
||||
syslog: conf.Syslog,
|
||||
}
|
||||
@@ -221,7 +229,7 @@ func (n *netavarkNetwork) loadNetworks() error {
|
||||
if networks[n.defaultNetwork] == nil {
|
||||
networkInfo, err := n.createDefaultNetwork()
|
||||
if err != nil {
|
||||
return errors.Wrapf(err, "failed to create default network %s", n.defaultNetwork)
|
||||
return fmt.Errorf("failed to create default network %s: %w", n.defaultNetwork, err)
|
||||
}
|
||||
networks[n.defaultNetwork] = networkInfo
|
||||
}
|
||||
@@ -242,7 +250,7 @@ func parseNetwork(network *types.Network) error {
|
||||
}
|
||||
|
||||
if len(network.ID) != 64 {
|
||||
return errors.Errorf("invalid network ID %q", network.ID)
|
||||
return fmt.Errorf("invalid network ID %q", network.ID)
|
||||
}
|
||||
|
||||
// add gateway when not internal or dns enabled
|
||||
@@ -284,7 +292,7 @@ func (n *netavarkNetwork) getNetwork(nameOrID string) (*types.Network, error) {
|
||||
|
||||
if strings.HasPrefix(val.ID, nameOrID) {
|
||||
if net != nil {
|
||||
return nil, errors.Errorf("more than one result for network ID %s", nameOrID)
|
||||
return nil, fmt.Errorf("more than one result for network ID %s", nameOrID)
|
||||
}
|
||||
net = val
|
||||
}
|
||||
@@ -292,7 +300,7 @@ func (n *netavarkNetwork) getNetwork(nameOrID string) (*types.Network, error) {
|
||||
if net != nil {
|
||||
return net, nil
|
||||
}
|
||||
return nil, errors.Wrapf(types.ErrNoSuchNetwork, "unable to find network with name or ID %s", nameOrID)
|
||||
return nil, fmt.Errorf("unable to find network with name or ID %s: %w", nameOrID, types.ErrNoSuchNetwork)
|
||||
}
|
||||
|
||||
// Implement the NetUtil interface for easy code sharing with other network interfaces.
|
||||
|
||||
5
vendor/github.com/containers/common/libnetwork/netavark/run.go
generated
vendored
5
vendor/github.com/containers/common/libnetwork/netavark/run.go
generated
vendored
@@ -10,7 +10,6 @@ import (
|
||||
|
||||
"github.com/containers/common/libnetwork/internal/util"
|
||||
"github.com/containers/common/libnetwork/types"
|
||||
"github.com/pkg/errors"
|
||||
"github.com/sirupsen/logrus"
|
||||
)
|
||||
|
||||
@@ -42,7 +41,7 @@ func (n *netavarkNetwork) Setup(namespacePath string, options types.SetupOptions
|
||||
|
||||
netavarkOpts, err := n.convertNetOpts(options.NetworkOptions)
|
||||
if err != nil {
|
||||
return nil, errors.Wrap(err, "failed to convert net opts")
|
||||
return nil, fmt.Errorf("failed to convert net opts: %w", err)
|
||||
}
|
||||
|
||||
// Warn users if one or more networks have dns enabled
|
||||
@@ -103,7 +102,7 @@ func (n *netavarkNetwork) Teardown(namespacePath string, options types.TeardownO
|
||||
|
||||
netavarkOpts, err := n.convertNetOpts(options.NetworkOptions)
|
||||
if err != nil {
|
||||
return errors.Wrap(err, "failed to convert net opts")
|
||||
return fmt.Errorf("failed to convert net opts: %w", err)
|
||||
}
|
||||
|
||||
retErr := n.execNetavark([]string{"teardown", namespacePath}, netavarkOpts, nil)
|
||||
|
||||
Reference in New Issue
Block a user