292 lines
9.1 KiB
Go
292 lines
9.1 KiB
Go
/*
|
|
Copyright 2021 The Kubernetes Authors All rights reserved.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package network
|
|
|
|
import (
|
|
"encoding/binary"
|
|
"fmt"
|
|
"net"
|
|
"sync"
|
|
"time"
|
|
|
|
"k8s.io/klog/v2"
|
|
)
|
|
|
|
const defaultReservationPeriod = 1 * time.Minute
|
|
|
|
var (
|
|
reservedSubnets = sync.Map{}
|
|
|
|
// valid private network subnets (RFC1918)
|
|
privateSubnets = []net.IPNet{
|
|
// 10.0.0.0/8
|
|
{
|
|
IP: []byte{10, 0, 0, 0},
|
|
Mask: []byte{255, 0, 0, 0},
|
|
},
|
|
// 172.16.0.0/12
|
|
{
|
|
IP: []byte{172, 16, 0, 0},
|
|
Mask: []byte{255, 240, 0, 0},
|
|
},
|
|
// 192.168.0.0/16
|
|
{
|
|
IP: []byte{192, 168, 0, 0},
|
|
Mask: []byte{255, 255, 0, 0},
|
|
},
|
|
}
|
|
)
|
|
|
|
// reservation of free private subnet is held for defined reservation period from createdAt time.
|
|
type reservation struct {
|
|
createdAt time.Time
|
|
}
|
|
|
|
// Parameters contains main network parameters.
|
|
type Parameters struct {
|
|
IP string // IP address of network
|
|
Netmask string // dotted-decimal format ('a.b.c.d')
|
|
Prefix int // network prefix length (number of leading ones in network mask)
|
|
CIDR string // CIDR format ('a.b.c.d/n')
|
|
Gateway string // taken from network interface address or assumed as first network IP address from given addr
|
|
ClientMin string // second IP address
|
|
ClientMax string // last IP address before broadcast
|
|
Broadcast string // last IP address
|
|
Interface
|
|
}
|
|
|
|
// Interface contains main network interface parameters.
|
|
type Interface struct {
|
|
IfaceName string
|
|
IfaceIPv4 string
|
|
IfaceMTU int
|
|
IfaceMAC string
|
|
}
|
|
|
|
// lookupInInterfaces iterates over all local network interfaces
|
|
// and tries to match "ip" with associated networks
|
|
// returns (network parameters, ip network, nil) if found
|
|
// (nil, nil, nil) it nof
|
|
// (nil, nil, error) if any error happened
|
|
func lookupInInterfaces(ip net.IP) (*Parameters, *net.IPNet, error) {
|
|
// check local network interfaces
|
|
ifaces, err := net.Interfaces()
|
|
if err != nil {
|
|
return nil, nil, fmt.Errorf("failed listing network interfaces: %w", err)
|
|
}
|
|
|
|
for _, iface := range ifaces {
|
|
|
|
ifAddrs, err := iface.Addrs()
|
|
if err != nil {
|
|
return nil, nil, fmt.Errorf("failed listing addresses of network interface %+v: %w", iface, err)
|
|
}
|
|
|
|
for _, ifAddr := range ifAddrs {
|
|
ifip, lan, err := net.ParseCIDR(ifAddr.String())
|
|
if err != nil {
|
|
return nil, nil, fmt.Errorf("failed parsing network interface address %+v: %w", ifAddr, err)
|
|
}
|
|
if lan.Contains(ip) {
|
|
ip4 := ifip.To4().String()
|
|
rt := Parameters{
|
|
Interface: Interface{
|
|
IfaceName: iface.Name,
|
|
IfaceIPv4: ip4,
|
|
IfaceMTU: iface.MTU,
|
|
IfaceMAC: iface.HardwareAddr.String(),
|
|
},
|
|
Gateway: ip4,
|
|
}
|
|
return &rt, lan, nil
|
|
}
|
|
}
|
|
}
|
|
return nil, nil, nil
|
|
}
|
|
|
|
// inspect initialises IPv4 network parameters struct from given address addr.
|
|
// addr can be single address (like "192.168.17.42"), network address (like "192.168.17.0") or in CIDR form (like "192.168.17.42/24 or "192.168.17.0/24").
|
|
// If addr belongs to network of local network interface, parameters will also contain info about that network interface.
|
|
func inspect(addr string) (*Parameters, error) {
|
|
|
|
// extract ip from addr
|
|
ip, network, err := net.ParseCIDR(addr)
|
|
if err != nil {
|
|
ip = net.ParseIP(addr)
|
|
if ip == nil {
|
|
return nil, fmt.Errorf("failed parsing address %s: %w", addr, err)
|
|
}
|
|
}
|
|
|
|
n := &Parameters{}
|
|
|
|
ifParams, ifNet, err := lookupInInterfaces(ip)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if ifNet != nil {
|
|
network = ifNet
|
|
n = ifParams
|
|
}
|
|
|
|
// couldn't determine network parameters from addr nor from network interfaces
|
|
if network == nil {
|
|
ipnet := &net.IPNet{
|
|
IP: ip,
|
|
Mask: ip.DefaultMask(), // assume default network mask
|
|
}
|
|
_, network, err = net.ParseCIDR(ipnet.String())
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed determining address of network from %s: %w", addr, err)
|
|
}
|
|
}
|
|
|
|
n.IP = network.IP.String()
|
|
n.Netmask = net.IP(network.Mask).String() // dotted-decimal format ('a.b.c.d')
|
|
n.Prefix, _ = network.Mask.Size()
|
|
n.CIDR = network.String()
|
|
|
|
networkIP := binary.BigEndian.Uint32(network.IP) // IP address of network
|
|
networkMask := binary.BigEndian.Uint32(network.Mask) // network mask
|
|
broadcastIP := (networkIP & networkMask) | (networkMask ^ 0xffffffff) // last network IP address
|
|
|
|
broadcast := make(net.IP, 4)
|
|
binary.BigEndian.PutUint32(broadcast, broadcastIP)
|
|
n.Broadcast = broadcast.String()
|
|
|
|
gateway := net.ParseIP(n.Gateway).To4() // has to be converted to 4-byte representation!
|
|
if gateway == nil {
|
|
gateway = make(net.IP, 4)
|
|
binary.BigEndian.PutUint32(gateway, networkIP+1) // assume first network IP address
|
|
n.Gateway = gateway.String()
|
|
}
|
|
gatewayIP := binary.BigEndian.Uint32(gateway)
|
|
|
|
min := make(net.IP, 4)
|
|
binary.BigEndian.PutUint32(min, gatewayIP+1) // clients-from: first network IP address after gateway
|
|
n.ClientMin = min.String()
|
|
|
|
max := make(net.IP, 4)
|
|
binary.BigEndian.PutUint32(max, broadcastIP-1) // clients-from: last network IP address before broadcast
|
|
n.ClientMax = max.String()
|
|
|
|
return n, nil
|
|
}
|
|
|
|
// isSubnetTaken returns if local network subnet exists and any error occurred.
|
|
// If will return false in case of an error.
|
|
func isSubnetTaken(subnet string) (bool, error) {
|
|
ifAddrs, err := net.InterfaceAddrs()
|
|
if err != nil {
|
|
return false, fmt.Errorf("failed listing network interface addresses: %w", err)
|
|
}
|
|
for _, ifAddr := range ifAddrs {
|
|
_, lan, err := net.ParseCIDR(ifAddr.String())
|
|
if err != nil {
|
|
return false, fmt.Errorf("failed parsing network interface address %+v: %w", ifAddr, err)
|
|
}
|
|
if lan.Contains(net.ParseIP(subnet)) {
|
|
return true, nil
|
|
}
|
|
}
|
|
return false, nil
|
|
}
|
|
|
|
// isSubnetPrivate returns if subnet is private network.
|
|
func isSubnetPrivate(subnet string) bool {
|
|
for _, ipnet := range privateSubnets {
|
|
if ipnet.Contains(net.ParseIP(subnet)) {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
// FreeSubnet will try to find free private network beginning with startSubnet, incrementing it in steps up to number of tries.
|
|
func FreeSubnet(startSubnet string, step, tries int) (*Parameters, error) {
|
|
for try := 0; try < tries; try++ {
|
|
n, err := inspect(startSubnet)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
startSubnet = n.IP
|
|
if isSubnetPrivate(startSubnet) {
|
|
taken, err := isSubnetTaken(startSubnet)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if !taken {
|
|
if ok := reserveSubnet(startSubnet, defaultReservationPeriod); ok {
|
|
klog.Infof("using free private subnet %s: %+v", n.CIDR, n)
|
|
return n, nil
|
|
}
|
|
klog.Infof("skipping subnet %s that is reserved: %+v", n.CIDR, n)
|
|
} else {
|
|
klog.Infof("skipping subnet %s that is taken: %+v", n.CIDR, n)
|
|
}
|
|
} else {
|
|
klog.Infof("skipping subnet %s that is not private", n.CIDR)
|
|
}
|
|
prefix, _ := net.ParseIP(n.IP).DefaultMask().Size()
|
|
nextSubnet := net.ParseIP(startSubnet).To4()
|
|
if prefix <= 16 {
|
|
nextSubnet[1] += byte(step)
|
|
} else {
|
|
nextSubnet[2] += byte(step)
|
|
}
|
|
startSubnet = nextSubnet.String()
|
|
}
|
|
return nil, fmt.Errorf("no free private network subnets found with given parameters (start: %q, step: %d, tries: %d)", startSubnet, step, tries)
|
|
}
|
|
|
|
// reserveSubnet returns if subnet was successfully reserved for given period:
|
|
// - false, if it already has unexpired reservation
|
|
// - true, if new reservation was created or expired one renewed
|
|
// uses sync.Map to manage reservations thread-safe
|
|
func reserveSubnet(subnet string, period time.Duration) bool {
|
|
// put 'zero' reservation{} Map value for subnet Map key
|
|
// to block other processes from concurrently changing this subnet
|
|
zero := reservation{}
|
|
r, loaded := reservedSubnets.LoadOrStore(subnet, zero)
|
|
// check if there was previously issued reservation
|
|
if loaded {
|
|
// back off if previous reservation was already set to 'zero'
|
|
// as then other process is already managing this subnet concurrently
|
|
if r == zero {
|
|
klog.Infof("backing off reserving subnet %s (other process is managing it!): %+v", subnet, &reservedSubnets)
|
|
return false
|
|
}
|
|
// check if previous reservation expired
|
|
createdAt := r.(reservation).createdAt
|
|
if time.Since(createdAt) < period {
|
|
// unexpired reservation: restore original createdAt value
|
|
reservedSubnets.Store(subnet, reservation{createdAt: createdAt})
|
|
klog.Infof("skipping subnet %s that has unexpired reservation: %+v", subnet, &reservedSubnets)
|
|
return false
|
|
}
|
|
// expired reservation: renew setting createdAt to now
|
|
reservedSubnets.Store(subnet, reservation{createdAt: time.Now()})
|
|
klog.Infof("reusing subnet %s that has expired reservation: %+v", subnet, &reservedSubnets)
|
|
return true
|
|
}
|
|
// new reservation
|
|
klog.Infof("reserving subnet %s for %v: %+v", subnet, period, &reservedSubnets)
|
|
reservedSubnets.Store(subnet, reservation{createdAt: time.Now()})
|
|
return true
|
|
}
|