mirror of
https://github.com/siderolabs/talos.git
synced 2025-08-21 14:41:12 +02:00
This PR will allow users to use an existing docker network for their talos cluster. Hoping this will be useful for those wanting further control and configuration of their local docker clusters, as well as possibly useful for us during CI. The docker networks can be pre-created with something like: `docker network create my-cluster --subnet 192.168.0.0/24 --label talos.owned=true --label talos.cluster.name=my-cluster`. Note that the labels are pre-reqs for our discovery and re-use of these networks. Signed-off-by: Spencer Smith <robertspencersmith@gmail.com>
88 lines
2.3 KiB
Go
88 lines
2.3 KiB
Go
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
package docker
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"strconv"
|
|
|
|
"github.com/docker/docker/api/types"
|
|
"github.com/docker/docker/api/types/filters"
|
|
"github.com/docker/docker/api/types/network"
|
|
"github.com/hashicorp/go-multierror"
|
|
|
|
"github.com/talos-systems/talos/internal/pkg/provision"
|
|
)
|
|
|
|
// createNetwork will take a network request and check if a network with the same name + cidr exists.
|
|
// If so, it simply returns without error and assumes we will re-use that network. Otherwise it will create a new one.
|
|
func (p *provisioner) createNetwork(ctx context.Context, req provision.NetworkRequest) error {
|
|
existingNet, err := p.listNetworks(ctx, req.Name)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// If named net already exists, see if we can reuse it
|
|
if len(existingNet) > 0 {
|
|
if existingNet[0].IPAM.Config[0].Subnet != req.CIDR.String() {
|
|
return fmt.Errorf("existing network has differing cidr: %s vs %s", existingNet[0].IPAM.Config[0].Subnet, req.CIDR.String())
|
|
}
|
|
// CIDRs match, we'll reuse
|
|
return nil
|
|
}
|
|
|
|
// Create new net
|
|
options := types.NetworkCreate{
|
|
Labels: map[string]string{
|
|
"talos.owned": "true",
|
|
"talos.cluster.name": req.Name,
|
|
},
|
|
IPAM: &network.IPAM{
|
|
Config: []network.IPAMConfig{
|
|
{
|
|
Subnet: req.CIDR.String(),
|
|
},
|
|
},
|
|
},
|
|
Options: map[string]string{
|
|
"com.docker.network.driver.mtu": strconv.Itoa(req.MTU),
|
|
},
|
|
}
|
|
|
|
_, err = p.client.NetworkCreate(ctx, req.Name, options)
|
|
|
|
return err
|
|
}
|
|
|
|
func (p *provisioner) listNetworks(ctx context.Context, name string) ([]types.NetworkResource, error) {
|
|
filters := filters.NewArgs()
|
|
filters.Add("label", "talos.owned=true")
|
|
filters.Add("label", "talos.cluster.name="+name)
|
|
|
|
options := types.NetworkListOptions{
|
|
Filters: filters,
|
|
}
|
|
|
|
return p.client.NetworkList(ctx, options)
|
|
}
|
|
|
|
func (p *provisioner) destroyNetwork(ctx context.Context, name string) error {
|
|
networks, err := p.listNetworks(ctx, name)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
var result *multierror.Error
|
|
|
|
for _, network := range networks {
|
|
if err := p.client.NetworkRemove(ctx, network.ID); err != nil {
|
|
result = multierror.Append(result, err)
|
|
}
|
|
}
|
|
|
|
return result.ErrorOrNil()
|
|
}
|