github.com/fcwu/docker@v1.4.2-0.20150115145920-2a69ca89f0df/daemon/networkdriver/ipallocator/allocator.go (about) 1 package ipallocator 2 3 import ( 4 "errors" 5 "math/big" 6 "net" 7 "sync" 8 9 log "github.com/Sirupsen/logrus" 10 "github.com/docker/docker/daemon/networkdriver" 11 ) 12 13 // allocatedMap is thread-unsafe set of allocated IP 14 type allocatedMap struct { 15 p map[string]struct{} 16 last *big.Int 17 begin *big.Int 18 end *big.Int 19 } 20 21 func newAllocatedMap(network *net.IPNet) *allocatedMap { 22 firstIP, lastIP := networkdriver.NetworkRange(network) 23 begin := big.NewInt(0).Add(ipToBigInt(firstIP), big.NewInt(1)) 24 end := big.NewInt(0).Sub(ipToBigInt(lastIP), big.NewInt(1)) 25 26 // if IPv4 network, then allocation range starts at begin + 1 because begin is bridge IP 27 if len(firstIP) == 4 { 28 begin = begin.Add(begin, big.NewInt(1)) 29 } 30 31 return &allocatedMap{ 32 p: make(map[string]struct{}), 33 begin: begin, 34 end: end, 35 last: big.NewInt(0).Sub(begin, big.NewInt(1)), // so first allocated will be begin 36 } 37 } 38 39 type networkSet map[string]*allocatedMap 40 41 var ( 42 ErrNoAvailableIPs = errors.New("no available ip addresses on network") 43 ErrIPAlreadyAllocated = errors.New("ip already allocated") 44 ErrIPOutOfRange = errors.New("requested ip is out of range") 45 ErrNetworkAlreadyRegistered = errors.New("network already registered") 46 ErrBadSubnet = errors.New("network does not contain specified subnet") 47 ) 48 49 var ( 50 lock = sync.Mutex{} 51 allocatedIPs = networkSet{} 52 ) 53 54 // RegisterSubnet registers network in global allocator with bounds 55 // defined by subnet. If you want to use network range you must call 56 // this method before first RequestIP, otherwise full network range will be used 57 func RegisterSubnet(network *net.IPNet, subnet *net.IPNet) error { 58 lock.Lock() 59 defer lock.Unlock() 60 key := network.String() 61 if _, ok := allocatedIPs[key]; ok { 62 return ErrNetworkAlreadyRegistered 63 } 64 n := newAllocatedMap(network) 65 beginIP, endIP := networkdriver.NetworkRange(subnet) 66 begin := big.NewInt(0).Add(ipToBigInt(beginIP), big.NewInt(1)) 67 end := big.NewInt(0).Sub(ipToBigInt(endIP), big.NewInt(1)) 68 69 // Check that subnet is within network 70 if !(begin.Cmp(n.begin) >= 0 && end.Cmp(n.end) <= 0 && begin.Cmp(end) == -1) { 71 return ErrBadSubnet 72 } 73 n.begin.Set(begin) 74 n.end.Set(end) 75 n.last.Sub(begin, big.NewInt(1)) 76 allocatedIPs[key] = n 77 return nil 78 } 79 80 // RequestIP requests an available ip from the given network. It 81 // will return the next available ip if the ip provided is nil. If the 82 // ip provided is not nil it will validate that the provided ip is available 83 // for use or return an error 84 func RequestIP(network *net.IPNet, ip net.IP) (net.IP, error) { 85 lock.Lock() 86 defer lock.Unlock() 87 key := network.String() 88 allocated, ok := allocatedIPs[key] 89 if !ok { 90 allocated = newAllocatedMap(network) 91 allocatedIPs[key] = allocated 92 } 93 94 if ip == nil { 95 return allocated.getNextIP() 96 } 97 return allocated.checkIP(ip) 98 } 99 100 // ReleaseIP adds the provided ip back into the pool of 101 // available ips to be returned for use. 102 func ReleaseIP(network *net.IPNet, ip net.IP) error { 103 lock.Lock() 104 defer lock.Unlock() 105 if allocated, exists := allocatedIPs[network.String()]; exists { 106 delete(allocated.p, ip.String()) 107 } 108 return nil 109 } 110 111 func (allocated *allocatedMap) checkIP(ip net.IP) (net.IP, error) { 112 if _, ok := allocated.p[ip.String()]; ok { 113 return nil, ErrIPAlreadyAllocated 114 } 115 116 pos := ipToBigInt(ip) 117 // Verify that the IP address is within our network range. 118 if pos.Cmp(allocated.begin) == -1 || pos.Cmp(allocated.end) == 1 { 119 return nil, ErrIPOutOfRange 120 } 121 122 // Register the IP. 123 allocated.p[ip.String()] = struct{}{} 124 allocated.last.Set(pos) 125 126 return ip, nil 127 } 128 129 // return an available ip if one is currently available. If not, 130 // return the next available ip for the nextwork 131 func (allocated *allocatedMap) getNextIP() (net.IP, error) { 132 pos := big.NewInt(0).Set(allocated.last) 133 allRange := big.NewInt(0).Sub(allocated.end, allocated.begin) 134 for i := big.NewInt(0); i.Cmp(allRange) <= 0; i.Add(i, big.NewInt(1)) { 135 pos.Add(pos, big.NewInt(1)) 136 if pos.Cmp(allocated.end) == 1 { 137 pos.Set(allocated.begin) 138 } 139 if _, ok := allocated.p[bigIntToIP(pos).String()]; ok { 140 continue 141 } 142 allocated.p[bigIntToIP(pos).String()] = struct{}{} 143 allocated.last.Set(pos) 144 return bigIntToIP(pos), nil 145 } 146 return nil, ErrNoAvailableIPs 147 } 148 149 // Converts a 4 bytes IP into a 128 bit integer 150 func ipToBigInt(ip net.IP) *big.Int { 151 x := big.NewInt(0) 152 if ip4 := ip.To4(); ip4 != nil { 153 return x.SetBytes(ip4) 154 } 155 if ip6 := ip.To16(); ip6 != nil { 156 return x.SetBytes(ip6) 157 } 158 159 log.Errorf("ipToBigInt: Wrong IP length! %s", ip) 160 return nil 161 } 162 163 // Converts 128 bit integer into a 4 bytes IP address 164 func bigIntToIP(v *big.Int) net.IP { 165 return net.IP(v.Bytes()) 166 }