Skip to content

Commit

Permalink
Merge pull request #47482 from akerouanton/25.0-swarm-ipam-validation
Browse files Browse the repository at this point in the history
[25.0 backport] Don't enforce new validation rules for existing networks
  • Loading branch information
thaJeztah committed Mar 1, 2024
2 parents 0676744 + 1ae019f commit 30ecc0e
Showing 1 changed file with 21 additions and 1 deletion.
22 changes: 21 additions & 1 deletion daemon/network.go
Expand Up @@ -332,7 +332,27 @@ func (daemon *Daemon) createNetwork(cfg *config.Config, create types.NetworkCrea
}

if err := network.ValidateIPAM(create.IPAM, create.EnableIPv6); err != nil {
return nil, errdefs.InvalidParameter(err)
if agent {
// This function is called with agent=false for all networks. For swarm-scoped
// networks, the configuration is validated but ManagerRedirectError is returned
// and the network is not created. Then, each time a swarm-scoped network is
// needed, this function is called again with agent=true.
//
// Non-swarm networks created before ValidateIPAM was introduced continue to work
// as they did before-upgrade, even if they would fail the new checks on creation
// (for example, by having host-bits set in their subnet). Those networks are not
// seen again here.
//
// By dropping errors for agent networks, existing swarm-scoped networks also
// continue to behave as they did before upgrade - but new networks are still
// validated.
log.G(context.TODO()).WithFields(log.Fields{
"error": err,
"network": create.Name,
}).Warn("Continuing with validation errors in agent IPAM")
} else {
return nil, errdefs.InvalidParameter(err)
}
}

if create.IPAM != nil {
Expand Down

0 comments on commit 30ecc0e

Please sign in to comment.