mirror of
https://github.com/siderolabs/talos.git
synced 2025-10-07 21:51:30 +02:00
Modify provision library to support multiple IPs, CIDRs, gateways, which can be IPv4/IPv6. Based on IP types, enable services in the cluster to run DHCPv4/DHCPv6 in the test environment. There's outstanding bug left with routes not being properly set up in the cluster so, IPs are not properly routable, but DHCPv6 works and IPs are allocated (validates DHCPv6 client). Signed-off-by: Andrey Smirnov <smirnov.andrey@gmail.com>
88 lines
2.3 KiB
Go
88 lines
2.3 KiB
Go
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
package docker
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"strconv"
|
|
|
|
"github.com/docker/docker/api/types"
|
|
"github.com/docker/docker/api/types/filters"
|
|
"github.com/docker/docker/api/types/network"
|
|
"github.com/hashicorp/go-multierror"
|
|
|
|
"github.com/talos-systems/talos/pkg/provision"
|
|
)
|
|
|
|
// createNetwork will take a network request and check if a network with the same name + cidr exists.
|
|
// If so, it simply returns without error and assumes we will re-use that network. Otherwise it will create a new one.
|
|
func (p *provisioner) createNetwork(ctx context.Context, req provision.NetworkRequest) error {
|
|
existingNet, err := p.listNetworks(ctx, req.Name)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// If named net already exists, see if we can reuse it
|
|
if len(existingNet) > 0 {
|
|
if existingNet[0].IPAM.Config[0].Subnet != req.CIDRs[0].String() {
|
|
return fmt.Errorf("existing network has differing cidr: %s vs %s", existingNet[0].IPAM.Config[0].Subnet, req.CIDRs[0].String())
|
|
}
|
|
// CIDRs match, we'll reuse
|
|
return nil
|
|
}
|
|
|
|
// Create new net
|
|
options := types.NetworkCreate{
|
|
Labels: map[string]string{
|
|
"talos.owned": "true",
|
|
"talos.cluster.name": req.Name,
|
|
},
|
|
IPAM: &network.IPAM{
|
|
Config: []network.IPAMConfig{
|
|
{
|
|
Subnet: req.CIDRs[0].String(),
|
|
},
|
|
},
|
|
},
|
|
Options: map[string]string{
|
|
"com.docker.network.driver.mtu": strconv.Itoa(req.MTU),
|
|
},
|
|
}
|
|
|
|
_, err = p.client.NetworkCreate(ctx, req.Name, options)
|
|
|
|
return err
|
|
}
|
|
|
|
func (p *provisioner) listNetworks(ctx context.Context, name string) ([]types.NetworkResource, error) {
|
|
filters := filters.NewArgs()
|
|
filters.Add("label", "talos.owned=true")
|
|
filters.Add("label", "talos.cluster.name="+name)
|
|
|
|
options := types.NetworkListOptions{
|
|
Filters: filters,
|
|
}
|
|
|
|
return p.client.NetworkList(ctx, options)
|
|
}
|
|
|
|
func (p *provisioner) destroyNetwork(ctx context.Context, name string) error {
|
|
networks, err := p.listNetworks(ctx, name)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
var result *multierror.Error
|
|
|
|
for _, network := range networks {
|
|
if err := p.client.NetworkRemove(ctx, network.ID); err != nil {
|
|
result = multierror.Append(result, err)
|
|
}
|
|
}
|
|
|
|
return result.ErrorOrNil()
|
|
}
|