| // FIXME(thaJeztah): remove once we are a module; the go:build directive prevents go from downgrading language version to go1.16: |
| //go:build go1.23 && linux |
| |
| package netutils |
| |
| import ( |
| "net/netip" |
| "os" |
| "slices" |
| |
| "github.com/docker/docker/internal/nlwrap" |
| "github.com/docker/docker/libnetwork/internal/netiputil" |
| "github.com/docker/docker/libnetwork/ns" |
| "github.com/docker/docker/libnetwork/resolvconf" |
| "github.com/docker/docker/libnetwork/types" |
| "github.com/pkg/errors" |
| "github.com/vishvananda/netlink" |
| ) |
| |
| // InferReservedNetworks returns a list of network prefixes that seem to be |
| // used by the system and that would likely break it if they were assigned to |
| // some Docker networks. It uses two heuristics to build that list: |
| // |
| // 1. Nameservers configured in /etc/resolv.conf ; |
| // 2. On-link routes ; |
| // |
| // That 2nd heuristic was originally not limited to on-links -- all non-default |
| // routes were checked (see [1]). This proved to be not ideal at best and |
| // highly problematic at worst: |
| // |
| // - VPN software and appliances doing split tunneling might push a small set |
| // of routes for large, aggregated prefixes to avoid maintenance and |
| // potential issues whenever a new subnet comes into use on internal |
| // network. However, not all subnets from these aggregates might be in use. |
| // - For full tunneling, especially when implemented with OpenVPN, the |
| // situation is even worse as the host might end up with the two following |
| // routes: 0.0.0.0/1 and 128.0.0.0/1. They are functionally |
| // indistinguishable from a default route, yet the Engine was treating them |
| // differently. With those routes, there was no way to use dynamic subnet |
| // allocation at all. (see 'def1' on [2]) |
| // - A subnet covered by the default route can be used, or not. Same for |
| // non-default and non-on-link routes. The type of route says little about |
| // the availability of subnets it covers, except for on-link routes as they |
| // specifically define what subnet the current host is part of. |
| // |
| // The 2nd heuristic was modified to be limited to on-link routes in PR #42598 |
| // (first released in v23.0, see [3]). |
| // |
| // If these heuristics don't detect an overlap, users should change their daemon |
| // config to remove that overlapping prefix from `default-address-pools`. If a |
| // prefix is found to overlap but users care enough about it being associated |
| // to a Docker network they can still rely on static allocation. |
| // |
| // For IPv6, the 2nd heuristic isn't applied as there's no such thing as |
| // on-link routes for IPv6. |
| // |
| // [1]: https://github.com/moby/libnetwork/commit/56832d6d89bf0f9d5280849026ee25ae4ae5f22e |
| // [2]: https://community.openvpn.net/openvpn/wiki/Openvpn23ManPage |
| // [3]: https://github.com/moby/moby/pull/42598 |
| func InferReservedNetworks(v6 bool) []netip.Prefix { |
| var reserved []netip.Prefix |
| |
| // We don't really care if os.ReadFile fails here. It either doesn't exist, |
| // or we can't read it for some reason. |
| if rc, err := os.ReadFile(resolvconf.Path()); err == nil { |
| reserved = slices.DeleteFunc(resolvconf.GetNameserversAsPrefix(rc), func(p netip.Prefix) bool { |
| return p.Addr().Is6() != v6 |
| }) |
| } |
| |
| if !v6 { |
| reserved = append(reserved, queryOnLinkRoutes()...) |
| } |
| |
| slices.SortFunc(reserved, netiputil.PrefixCompare) |
| return reserved |
| } |
| |
| // queryOnLinkRoutes returns a list of on-link routes available on the host. |
| // Only IPv4 prefixes are returned as there's no such thing as on-link |
| // routes for IPv6. |
| func queryOnLinkRoutes() []netip.Prefix { |
| routes, err := ns.NlHandle().RouteList(nil, netlink.FAMILY_V4) |
| if err != nil { |
| return nil |
| } |
| |
| var prefixes []netip.Prefix |
| for _, route := range routes { |
| if route.Scope == netlink.SCOPE_LINK && route.Dst != nil && !route.Dst.IP.IsUnspecified() { |
| if p, ok := netiputil.ToPrefix(route.Dst); ok { |
| prefixes = append(prefixes, p) |
| } |
| } |
| } |
| |
| return prefixes |
| } |
| |
| // GenerateIfaceName returns an interface name using the passed in |
| // prefix and the length of random bytes. The api ensures that the |
| // there is no interface which exists with that name. |
| func GenerateIfaceName(nlh nlwrap.Handle, prefix string, len int) (string, error) { |
| for i := 0; i < 3; i++ { |
| name, err := GenerateRandomName(prefix, len) |
| if err != nil { |
| return "", err |
| } |
| if nlh.Handle == nil { |
| _, err = nlwrap.LinkByName(name) |
| } else { |
| _, err = nlh.LinkByName(name) |
| } |
| if err != nil { |
| if errors.As(err, &netlink.LinkNotFoundError{}) { |
| return name, nil |
| } |
| return "", err |
| } |
| } |
| return "", types.InternalErrorf("could not generate interface name") |
| } |