dotcloud/docker

View on GitHub
libnetwork/ns/init_linux.go

Summary

Maintainability
A
0 mins
Test Coverage
package ns

import (
    "context"
    "fmt"
    "os/exec"
    "strings"
    "sync"
    "syscall"
    "time"

    "github.com/containerd/log"
    "github.com/vishvananda/netlink"
    "github.com/vishvananda/netns"
)

var (
    initNs   netns.NsHandle
    initNl   *netlink.Handle
    initOnce sync.Once
    // NetlinkSocketsTimeout represents the default timeout duration for the sockets
    NetlinkSocketsTimeout = 3 * time.Second
)

// Init initializes a new network namespace
func Init() {
    var err error
    initNs, err = netns.Get()
    if err != nil {
        log.G(context.TODO()).Errorf("could not get initial namespace: %v", err)
    }
    initNl, err = netlink.NewHandle(getSupportedNlFamilies()...)
    if err != nil {
        log.G(context.TODO()).Errorf("could not create netlink handle on initial namespace: %v", err)
    }
    err = initNl.SetSocketTimeout(NetlinkSocketsTimeout)
    if err != nil {
        log.G(context.TODO()).Warnf("Failed to set the timeout on the default netlink handle sockets: %v", err)
    }
}

// ParseHandlerInt transforms the namespace handler into an integer
func ParseHandlerInt() int {
    return int(getHandler())
}

// GetHandler returns the namespace handler
func getHandler() netns.NsHandle {
    initOnce.Do(Init)
    return initNs
}

// NlHandle returns the netlink handler
func NlHandle() *netlink.Handle {
    initOnce.Do(Init)
    return initNl
}

func getSupportedNlFamilies() []int {
    fams := []int{syscall.NETLINK_ROUTE}
    // NETLINK_XFRM test
    if err := checkXfrmSocket(); err != nil {
        log.G(context.TODO()).Warnf("Could not load necessary modules for IPSEC rules: %v", err)
    } else {
        fams = append(fams, syscall.NETLINK_XFRM)
    }
    // NETLINK_NETFILTER test
    if err := loadNfConntrackModules(); err != nil {
        if checkNfSocket() != nil {
            log.G(context.TODO()).Warnf("Could not load necessary modules for Conntrack: %v", err)
        } else {
            fams = append(fams, syscall.NETLINK_NETFILTER)
        }
    } else {
        fams = append(fams, syscall.NETLINK_NETFILTER)
    }

    return fams
}

// API check on required xfrm modules (xfrm_user, xfrm_algo)
func checkXfrmSocket() error {
    fd, err := syscall.Socket(syscall.AF_NETLINK, syscall.SOCK_RAW, syscall.NETLINK_XFRM)
    if err != nil {
        return err
    }
    syscall.Close(fd)
    return nil
}

func loadNfConntrackModules() error {
    if out, err := exec.Command("modprobe", "-va", "nf_conntrack").CombinedOutput(); err != nil {
        return fmt.Errorf("Running modprobe nf_conntrack failed with message: `%s`, error: %v", strings.TrimSpace(string(out)), err)
    }
    if out, err := exec.Command("modprobe", "-va", "nf_conntrack_netlink").CombinedOutput(); err != nil {
        return fmt.Errorf("Running modprobe nf_conntrack_netlink failed with message: `%s`, error: %v", strings.TrimSpace(string(out)), err)
    }
    return nil
}

// API check on required nf_conntrack* modules (nf_conntrack, nf_conntrack_netlink)
func checkNfSocket() error {
    fd, err := syscall.Socket(syscall.AF_NETLINK, syscall.SOCK_RAW, syscall.NETLINK_NETFILTER)
    if err != nil {
        return err
    }
    syscall.Close(fd)
    return nil
}