2013-02-20 20:47:09 -05:00
package docker
import (
2013-02-21 21:33:23 -05:00
"encoding/binary"
2013-02-25 13:45:23 -05:00
"errors"
2013-02-20 21:20:18 -05:00
"fmt"
2013-05-14 18:37:35 -04:00
"github.com/dotcloud/docker/utils"
2013-02-28 14:50:02 -05:00
"log"
2013-02-20 20:47:09 -05:00
"net"
2013-02-28 14:50:02 -05:00
"os/exec"
"strconv"
"strings"
2013-04-05 01:56:12 -04:00
"sync"
2013-02-20 20:47:09 -05:00
)
2013-04-03 17:53:09 -04:00
var NetworkBridgeIface string
2013-02-20 20:47:09 -05:00
const (
2013-04-05 17:16:19 -04:00
DefaultNetworkBridge = "docker0"
2013-07-21 20:49:09 -04:00
DisableNetworkBridge = "none"
2013-04-04 08:33:28 -04:00
portRangeStart = 49153
portRangeEnd = 65535
2013-02-20 20:47:09 -05:00
)
2013-02-28 14:50:02 -05:00
// Calculates the first and last IP addresses in an IPNet
2013-02-21 21:33:23 -05:00
func networkRange ( network * net . IPNet ) ( net . IP , net . IP ) {
netIP := network . IP . To4 ( )
firstIP := netIP . Mask ( network . Mask )
lastIP := net . IPv4 ( 0 , 0 , 0 , 0 ) . To4 ( )
for i := 0 ; i < len ( lastIP ) ; i ++ {
lastIP [ i ] = netIP [ i ] | ^ network . Mask [ i ]
}
return firstIP , lastIP
}
2013-04-03 17:53:54 -04:00
// Detects overlap between one IPNet and another
func networkOverlaps ( netX * net . IPNet , netY * net . IPNet ) bool {
firstIP , _ := networkRange ( netX )
if netY . Contains ( firstIP ) {
return true
}
firstIP , _ = networkRange ( netY )
if netX . Contains ( firstIP ) {
return true
}
return false
}
2013-02-28 14:50:02 -05:00
// Converts a 4 bytes IP into a 32 bit integer
2013-03-30 18:32:10 -04:00
func ipToInt ( ip net . IP ) int32 {
return int32 ( binary . BigEndian . Uint32 ( ip . To4 ( ) ) )
2013-02-21 21:33:23 -05:00
}
2013-02-28 14:50:02 -05:00
// Converts 32 bit integer into a 4 bytes IP address
2013-06-04 14:00:22 -04:00
func intToIP ( n int32 ) net . IP {
2013-03-30 18:32:10 -04:00
b := make ( [ ] byte , 4 )
binary . BigEndian . PutUint32 ( b , uint32 ( n ) )
return net . IP ( b )
2013-02-21 21:33:23 -05:00
}
2013-02-28 14:50:02 -05:00
// Given a netmask, calculates the number of available hosts
2013-03-30 18:32:10 -04:00
func networkSize ( mask net . IPMask ) int32 {
2013-02-25 17:06:22 -05:00
m := net . IPv4Mask ( 0 , 0 , 0 , 0 )
2013-02-21 21:33:23 -05:00
for i := 0 ; i < net . IPv4len ; i ++ {
2013-02-25 17:06:22 -05:00
m [ i ] = ^ mask [ i ]
2013-02-21 21:33:23 -05:00
}
2013-03-30 18:32:10 -04:00
return int32 ( binary . BigEndian . Uint32 ( m ) ) + 1
2013-02-21 21:33:23 -05:00
}
2013-04-03 18:57:57 -04:00
//Wrapper around the ip command
func ip ( args ... string ) ( string , error ) {
path , err := exec . LookPath ( "ip" )
if err != nil {
return "" , fmt . Errorf ( "command not found: ip" )
}
output , err := exec . Command ( path , args ... ) . CombinedOutput ( )
if err != nil {
return "" , fmt . Errorf ( "ip failed: ip %v" , strings . Join ( args , " " ) )
}
return string ( output ) , nil
}
2013-02-28 14:50:02 -05:00
// Wrapper around the iptables command
func iptables ( args ... string ) error {
2013-03-27 14:29:58 -04:00
path , err := exec . LookPath ( "iptables" )
if err != nil {
2013-03-28 15:30:56 -04:00
return fmt . Errorf ( "command not found: iptables" )
2013-03-27 14:29:58 -04:00
}
if err := exec . Command ( path , args ... ) . Run ( ) ; err != nil {
2013-02-28 14:50:02 -05:00
return fmt . Errorf ( "iptables failed: iptables %v" , strings . Join ( args , " " ) )
}
return nil
}
2013-08-01 21:12:39 -04:00
func checkRouteOverlaps ( routes string , dockerNetwork * net . IPNet ) error {
utils . Debugf ( "Routes:\n\n%s" , routes )
for _ , line := range strings . Split ( routes , "\n" ) {
2013-04-03 18:57:57 -04:00
if strings . Trim ( line , "\r\n\t " ) == "" || strings . Contains ( line , "default" ) {
continue
}
2013-08-01 21:12:39 -04:00
_ , network , err := net . ParseCIDR ( strings . Split ( line , " " ) [ 0 ] )
if err != nil {
2013-07-31 20:42:22 -04:00
// is this a mask-less IP address?
if ip := net . ParseIP ( strings . Split ( line , " " ) [ 0 ] ) ; ip == nil {
// fail only if it's neither a network nor a mask-less IP address
return fmt . Errorf ( "Unexpected ip route output: %s (%s)" , err , line )
2013-08-01 21:12:39 -04:00
} else {
_ , network , err = net . ParseCIDR ( ip . String ( ) + "/32" )
if err != nil {
return err
}
}
}
if err == nil && network != nil {
if networkOverlaps ( dockerNetwork , network ) {
return fmt . Errorf ( "Network %s is already routed: '%s'" , dockerNetwork , line )
2013-07-31 20:42:22 -04:00
}
2013-04-03 18:57:57 -04:00
}
}
return nil
}
2013-07-22 15:06:24 -04:00
// CreateBridgeIface creates a network bridge interface on the host system with the name `ifaceName`,
// and attempts to configure it with an address which doesn't conflict with any other interface on the host.
// If it can't find an address which doesn't conflict, it will return an error.
2013-04-03 18:57:57 -04:00
func CreateBridgeIface ( ifaceName string ) error {
2013-07-22 15:06:24 -04:00
addrs := [ ] string {
// Here we don't follow the convention of using the 1st IP of the range for the gateway.
// This is to use the same gateway IPs as the /24 ranges, which predate the /16 ranges.
// In theory this shouldn't matter - in practice there's bound to be a few scripts relying
// on the internal addressing or other stupid things like that.
// The shouldn't, but hey, let's not break them unless we really have to.
2013-08-06 20:24:10 -04:00
"172.17.42.1/16" , // Don't use 172.16.0.0/16, it conflicts with EC2 DNS 172.16.0.23
"10.0.42.1/16" , // Don't even try using the entire /8, that's too intrusive
2013-07-22 15:06:24 -04:00
"10.1.42.1/16" ,
"10.42.42.1/16" ,
"172.16.42.1/24" ,
"172.16.43.1/24" ,
"172.16.44.1/24" ,
"10.0.42.1/24" ,
"10.0.43.1/24" ,
"192.168.42.1/24" ,
"192.168.43.1/24" ,
"192.168.44.1/24" ,
}
2013-04-03 18:57:57 -04:00
var ifaceAddr string
for _ , addr := range addrs {
_ , dockerNetwork , err := net . ParseCIDR ( addr )
if err != nil {
return err
}
2013-08-01 21:12:39 -04:00
routes , err := ip ( "route" )
if err != nil {
return err
}
if err := checkRouteOverlaps ( routes , dockerNetwork ) ; err == nil {
2013-04-03 18:57:57 -04:00
ifaceAddr = addr
break
} else {
2013-05-14 18:37:35 -04:00
utils . Debugf ( "%s: %s" , addr , err )
2013-04-03 18:57:57 -04:00
}
}
if ifaceAddr == "" {
2013-04-08 21:16:58 -04:00
return fmt . Errorf ( "Could not find a free IP address range for interface '%s'. Please configure its address manually and run 'docker -b %s'" , ifaceName , ifaceName )
2013-04-03 18:57:57 -04:00
}
2013-06-04 09:51:12 -04:00
utils . Debugf ( "Creating bridge %s with network %s" , ifaceName , ifaceAddr )
2013-04-03 18:57:57 -04:00
if output , err := ip ( "link" , "add" , ifaceName , "type" , "bridge" ) ; err != nil {
return fmt . Errorf ( "Error creating bridge: %s (output: %s)" , err , output )
}
if output , err := ip ( "addr" , "add" , ifaceAddr , "dev" , ifaceName ) ; err != nil {
return fmt . Errorf ( "Unable to add private network: %s (%s)" , err , output )
}
if output , err := ip ( "link" , "set" , ifaceName , "up" ) ; err != nil {
return fmt . Errorf ( "Unable to start network bridge: %s (%s)" , err , output )
}
if err := iptables ( "-t" , "nat" , "-A" , "POSTROUTING" , "-s" , ifaceAddr ,
"!" , "-d" , ifaceAddr , "-j" , "MASQUERADE" ) ; err != nil {
return fmt . Errorf ( "Unable to enable network bridge NAT: %s" , err )
}
return nil
}
2013-02-28 14:50:02 -05:00
// Return the IPv4 address of a network interface
2013-02-25 17:06:22 -05:00
func getIfaceAddr ( name string ) ( net . Addr , error ) {
2013-02-20 21:20:18 -05:00
iface , err := net . InterfaceByName ( name )
if err != nil {
return nil , err
}
addrs , err := iface . Addrs ( )
if err != nil {
return nil , err
}
var addrs4 [ ] net . Addr
for _ , addr := range addrs {
ip := ( addr . ( * net . IPNet ) ) . IP
if ip4 := ip . To4 ( ) ; len ( ip4 ) == net . IPv4len {
addrs4 = append ( addrs4 , addr )
}
}
switch {
case len ( addrs4 ) == 0 :
2013-02-28 14:50:02 -05:00
return nil , fmt . Errorf ( "Interface %v has no IP addresses" , name )
2013-02-20 21:20:18 -05:00
case len ( addrs4 ) > 1 :
2013-03-21 12:19:22 -04:00
fmt . Printf ( "Interface %v has more than 1 IPv4 address. Defaulting to using %v\n" ,
name , ( addrs4 [ 0 ] . ( * net . IPNet ) ) . IP )
2013-02-20 21:20:18 -05:00
}
return addrs4 [ 0 ] , nil
}
2013-02-28 14:50:02 -05:00
// Port mapper takes care of mapping external ports to containers by setting
// up iptables rules.
// It keeps track of all mappings and is able to unmap at will
type PortMapper struct {
2013-06-11 18:46:23 -04:00
tcpMapping map [ int ] * net . TCPAddr
tcpProxies map [ int ] Proxy
udpMapping map [ int ] * net . UDPAddr
udpProxies map [ int ] Proxy
2013-02-28 14:50:02 -05:00
}
func ( mapper * PortMapper ) cleanup ( ) error {
// Ignore errors - This could mean the chains were never set up
2013-04-03 18:32:46 -04:00
iptables ( "-t" , "nat" , "-D" , "PREROUTING" , "-m" , "addrtype" , "--dst-type" , "LOCAL" , "-j" , "DOCKER" )
2013-04-19 22:32:32 -04:00
iptables ( "-t" , "nat" , "-D" , "OUTPUT" , "-m" , "addrtype" , "--dst-type" , "LOCAL" , "!" , "--dst" , "127.0.0.0/8" , "-j" , "DOCKER" )
iptables ( "-t" , "nat" , "-D" , "OUTPUT" , "-m" , "addrtype" , "--dst-type" , "LOCAL" , "-j" , "DOCKER" ) // Created in versions <= 0.1.6
2013-04-04 18:16:42 -04:00
// Also cleanup rules created by older versions, or -X might fail.
iptables ( "-t" , "nat" , "-D" , "PREROUTING" , "-j" , "DOCKER" )
iptables ( "-t" , "nat" , "-D" , "OUTPUT" , "-j" , "DOCKER" )
2013-02-28 14:50:02 -05:00
iptables ( "-t" , "nat" , "-F" , "DOCKER" )
iptables ( "-t" , "nat" , "-X" , "DOCKER" )
2013-06-11 18:46:23 -04:00
mapper . tcpMapping = make ( map [ int ] * net . TCPAddr )
mapper . tcpProxies = make ( map [ int ] Proxy )
mapper . udpMapping = make ( map [ int ] * net . UDPAddr )
mapper . udpProxies = make ( map [ int ] Proxy )
2013-02-28 14:50:02 -05:00
return nil
}
func ( mapper * PortMapper ) setup ( ) error {
if err := iptables ( "-t" , "nat" , "-N" , "DOCKER" ) ; err != nil {
2013-03-28 15:44:54 -04:00
return fmt . Errorf ( "Failed to create DOCKER chain: %s" , err )
2013-02-20 21:20:18 -05:00
}
2013-04-03 18:32:46 -04:00
if err := iptables ( "-t" , "nat" , "-A" , "PREROUTING" , "-m" , "addrtype" , "--dst-type" , "LOCAL" , "-j" , "DOCKER" ) ; err != nil {
2013-03-28 15:44:54 -04:00
return fmt . Errorf ( "Failed to inject docker in PREROUTING chain: %s" , err )
2013-02-28 14:50:02 -05:00
}
2013-04-19 22:32:32 -04:00
if err := iptables ( "-t" , "nat" , "-A" , "OUTPUT" , "-m" , "addrtype" , "--dst-type" , "LOCAL" , "!" , "--dst" , "127.0.0.0/8" , "-j" , "DOCKER" ) ; err != nil {
2013-03-28 15:44:54 -04:00
return fmt . Errorf ( "Failed to inject docker in OUTPUT chain: %s" , err )
2013-03-22 10:06:14 -04:00
}
2013-02-28 14:50:02 -05:00
return nil
}
2013-06-11 18:46:23 -04:00
func ( mapper * PortMapper ) iptablesForward ( rule string , port int , proto string , dest_addr string , dest_port int ) error {
return iptables ( "-t" , "nat" , rule , "DOCKER" , "-p" , proto , "--dport" , strconv . Itoa ( port ) ,
2013-08-06 13:00:45 -04:00
"!" , "-i" , NetworkBridgeIface ,
2013-06-11 18:46:23 -04:00
"-j" , "DNAT" , "--to-destination" , net . JoinHostPort ( dest_addr , strconv . Itoa ( dest_port ) ) )
2013-02-28 14:50:02 -05:00
}
2013-06-11 18:46:23 -04:00
func ( mapper * PortMapper ) Map ( port int , backendAddr net . Addr ) error {
if _ , isTCP := backendAddr . ( * net . TCPAddr ) ; isTCP {
backendPort := backendAddr . ( * net . TCPAddr ) . Port
backendIP := backendAddr . ( * net . TCPAddr ) . IP
if err := mapper . iptablesForward ( "-A" , port , "tcp" , backendIP . String ( ) , backendPort ) ; err != nil {
return err
}
mapper . tcpMapping [ port ] = backendAddr . ( * net . TCPAddr )
2013-08-06 13:00:45 -04:00
proxy , err := NewProxy ( & net . TCPAddr { IP : net . IPv4 ( 0 , 0 , 0 , 0 ) , Port : port } , backendAddr )
2013-04-19 22:35:44 -04:00
if err != nil {
2013-06-11 18:46:23 -04:00
mapper . Unmap ( port , "tcp" )
2013-04-19 22:35:44 -04:00
return err
}
2013-06-11 18:46:23 -04:00
mapper . tcpProxies [ port ] = proxy
go proxy . Run ( )
} else {
backendPort := backendAddr . ( * net . UDPAddr ) . Port
backendIP := backendAddr . ( * net . UDPAddr ) . IP
if err := mapper . iptablesForward ( "-A" , port , "udp" , backendIP . String ( ) , backendPort ) ; err != nil {
return err
}
mapper . udpMapping [ port ] = backendAddr . ( * net . UDPAddr )
2013-08-06 13:00:45 -04:00
proxy , err := NewProxy ( & net . UDPAddr { IP : net . IPv4 ( 0 , 0 , 0 , 0 ) , Port : port } , backendAddr )
2013-04-19 22:35:44 -04:00
if err != nil {
2013-06-11 18:46:23 -04:00
mapper . Unmap ( port , "udp" )
return err
2013-04-19 22:35:44 -04:00
}
2013-06-11 18:46:23 -04:00
mapper . udpProxies [ port ] = proxy
go proxy . Run ( )
2013-04-19 22:35:44 -04:00
}
2013-06-11 18:46:23 -04:00
return nil
2013-04-19 22:35:44 -04:00
}
2013-06-11 18:46:23 -04:00
func ( mapper * PortMapper ) Unmap ( port int , proto string ) error {
if proto == "tcp" {
backendAddr , ok := mapper . tcpMapping [ port ]
if ! ok {
return fmt . Errorf ( "Port tcp/%v is not mapped" , port )
}
if proxy , exists := mapper . tcpProxies [ port ] ; exists {
proxy . Close ( )
delete ( mapper . tcpProxies , port )
}
if err := mapper . iptablesForward ( "-D" , port , proto , backendAddr . IP . String ( ) , backendAddr . Port ) ; err != nil {
return err
}
delete ( mapper . tcpMapping , port )
} else {
backendAddr , ok := mapper . udpMapping [ port ]
if ! ok {
return fmt . Errorf ( "Port udp/%v is not mapped" , port )
}
if proxy , exists := mapper . udpProxies [ port ] ; exists {
proxy . Close ( )
delete ( mapper . udpProxies , port )
}
if err := mapper . iptablesForward ( "-D" , port , proto , backendAddr . IP . String ( ) , backendAddr . Port ) ; err != nil {
return err
}
delete ( mapper . udpMapping , port )
2013-02-21 21:33:23 -05:00
}
2013-02-28 14:50:02 -05:00
return nil
}
func newPortMapper ( ) ( * PortMapper , error ) {
mapper := & PortMapper { }
if err := mapper . cleanup ( ) ; err != nil {
2013-02-25 17:06:22 -05:00
return nil , err
2013-02-20 20:47:09 -05:00
}
2013-02-28 14:50:02 -05:00
if err := mapper . setup ( ) ; err != nil {
return nil , err
}
return mapper , nil
2013-02-20 20:47:09 -05:00
}
2013-02-25 13:45:23 -05:00
2013-08-12 13:53:06 -04:00
// Port allocator: Automatically allocate and release networking ports
2013-02-28 14:50:02 -05:00
type PortAllocator struct {
2013-07-02 18:46:32 -04:00
sync . Mutex
2013-04-05 01:58:01 -04:00
inUse map [ int ] struct { }
2013-04-05 01:56:12 -04:00
fountain chan ( int )
2013-02-25 13:45:23 -05:00
}
2013-04-05 01:56:12 -04:00
func ( alloc * PortAllocator ) runFountain ( ) {
for {
for port := portRangeStart ; port < portRangeEnd ; port ++ {
alloc . fountain <- port
}
2013-02-25 13:45:23 -05:00
}
}
2013-04-05 01:56:12 -04:00
// FIXME: Release can no longer fail, change its prototype to reflect that.
2013-02-28 14:50:02 -05:00
func ( alloc * PortAllocator ) Release ( port int ) error {
2013-05-14 18:37:35 -04:00
utils . Debugf ( "Releasing %d" , port )
2013-07-02 18:46:32 -04:00
alloc . Lock ( )
2013-04-05 01:56:12 -04:00
delete ( alloc . inUse , port )
2013-07-02 18:46:32 -04:00
alloc . Unlock ( )
2013-04-05 01:56:12 -04:00
return nil
}
func ( alloc * PortAllocator ) Acquire ( port int ) ( int , error ) {
2013-05-14 18:37:35 -04:00
utils . Debugf ( "Acquiring %d" , port )
2013-04-05 01:56:12 -04:00
if port == 0 {
// Allocate a port from the fountain
for port := range alloc . fountain {
if _ , err := alloc . Acquire ( port ) ; err == nil {
return port , nil
}
}
return - 1 , fmt . Errorf ( "Port generator ended unexpectedly" )
2013-02-25 13:45:23 -05:00
}
2013-07-02 18:46:32 -04:00
alloc . Lock ( )
defer alloc . Unlock ( )
2013-04-05 01:56:12 -04:00
if _ , inUse := alloc . inUse [ port ] ; inUse {
return - 1 , fmt . Errorf ( "Port already in use: %d" , port )
}
alloc . inUse [ port ] = struct { } { }
return port , nil
2013-02-25 13:45:23 -05:00
}
2013-04-05 01:56:12 -04:00
func newPortAllocator ( ) ( * PortAllocator , error ) {
allocator := & PortAllocator {
2013-04-12 10:37:24 -04:00
inUse : make ( map [ int ] struct { } ) ,
2013-04-05 16:03:04 -04:00
fountain : make ( chan int ) ,
2013-04-05 01:56:12 -04:00
}
go allocator . runFountain ( )
2013-02-28 14:50:02 -05:00
return allocator , nil
}
2013-08-12 13:53:06 -04:00
// IP allocator: Automatically allocate and release networking ports
2013-02-28 14:50:02 -05:00
type IPAllocator struct {
2013-03-30 18:32:10 -04:00
network * net . IPNet
queueAlloc chan allocatedIP
queueReleased chan net . IP
inUse map [ int32 ] struct { }
}
type allocatedIP struct {
ip net . IP
err error
2013-02-28 14:50:02 -05:00
}
2013-03-30 18:32:10 -04:00
func ( alloc * IPAllocator ) run ( ) {
2013-02-28 14:50:02 -05:00
firstIP , _ := networkRange ( alloc . network )
2013-03-30 18:32:10 -04:00
ipNum := ipToInt ( firstIP )
ownIP := ipToInt ( alloc . network . IP )
size := networkSize ( alloc . network . Mask )
pos := int32 ( 1 )
max := size - 2 // -1 for the broadcast address, -1 for the gateway address
for {
var (
newNum int32
inUse bool
)
// Find first unused IP, give up after one whole round
for attempt := int32 ( 0 ) ; attempt < max ; attempt ++ {
newNum = ipNum + pos
pos = pos % max + 1
// The network's IP is never okay to use
if newNum == ownIP {
continue
}
if _ , inUse = alloc . inUse [ newNum ] ; ! inUse {
// We found an unused IP
break
}
2013-02-25 13:45:23 -05:00
}
2013-03-30 18:32:10 -04:00
2013-06-04 14:00:22 -04:00
ip := allocatedIP { ip : intToIP ( newNum ) }
2013-03-30 18:32:10 -04:00
if inUse {
ip . err = errors . New ( "No unallocated IP available" )
2013-02-25 13:45:23 -05:00
}
2013-03-30 18:32:10 -04:00
select {
case alloc . queueAlloc <- ip :
alloc . inUse [ newNum ] = struct { } { }
case released := <- alloc . queueReleased :
r := ipToInt ( released )
delete ( alloc . inUse , r )
if inUse {
// If we couldn't allocate a new IP, the released one
// will be the only free one now, so instantly use it
// next time
pos = r - ipNum
} else {
// Use same IP as last time
if pos == 1 {
pos = max
} else {
pos --
}
}
2013-02-25 13:45:23 -05:00
}
2013-02-28 14:50:02 -05:00
}
}
func ( alloc * IPAllocator ) Acquire ( ) ( net . IP , error ) {
2013-03-30 18:32:10 -04:00
ip := <- alloc . queueAlloc
return ip . ip , ip . err
2013-02-28 14:50:02 -05:00
}
2013-03-30 18:32:10 -04:00
func ( alloc * IPAllocator ) Release ( ip net . IP ) {
alloc . queueReleased <- ip
2013-02-25 13:45:23 -05:00
}
2013-03-30 18:32:10 -04:00
func newIPAllocator ( network * net . IPNet ) * IPAllocator {
2013-02-28 14:50:02 -05:00
alloc := & IPAllocator {
2013-03-30 18:32:10 -04:00
network : network ,
queueAlloc : make ( chan allocatedIP ) ,
queueReleased : make ( chan net . IP ) ,
inUse : make ( map [ int32 ] struct { } ) ,
2013-02-28 14:50:02 -05:00
}
2013-03-30 18:32:10 -04:00
go alloc . run ( )
return alloc
2013-02-28 14:50:02 -05:00
}
// Network interface represents the networking stack of a container
type NetworkInterface struct {
IPNet net . IPNet
Gateway net . IP
manager * NetworkManager
2013-06-11 18:46:23 -04:00
extPorts [ ] * Nat
2013-07-21 20:49:09 -04:00
disabled bool
2013-02-28 14:50:02 -05:00
}
// Allocate an external TCP port and map it to the interface
2013-04-05 01:58:01 -04:00
func ( iface * NetworkInterface ) AllocatePort ( spec string ) ( * Nat , error ) {
2013-07-21 20:49:09 -04:00
if iface . disabled {
return nil , fmt . Errorf ( "Trying to allocate port for interface %v, which is disabled" , iface ) // FIXME
}
2013-04-05 01:58:01 -04:00
nat , err := parseNat ( spec )
2013-02-28 14:50:02 -05:00
if err != nil {
2013-04-05 01:58:01 -04:00
return nil , err
}
2013-06-11 18:46:23 -04:00
if nat . Proto == "tcp" {
extPort , err := iface . manager . tcpPortAllocator . Acquire ( nat . Frontend )
if err != nil {
return nil , err
}
backend := & net . TCPAddr { IP : iface . IPNet . IP , Port : nat . Backend }
if err := iface . manager . portMapper . Map ( extPort , backend ) ; err != nil {
iface . manager . tcpPortAllocator . Release ( extPort )
return nil , err
}
nat . Frontend = extPort
} else {
extPort , err := iface . manager . udpPortAllocator . Acquire ( nat . Frontend )
if err != nil {
return nil , err
}
backend := & net . UDPAddr { IP : iface . IPNet . IP , Port : nat . Backend }
if err := iface . manager . portMapper . Map ( extPort , backend ) ; err != nil {
iface . manager . udpPortAllocator . Release ( extPort )
return nil , err
}
nat . Frontend = extPort
2013-04-05 01:58:01 -04:00
}
2013-06-11 18:46:23 -04:00
iface . extPorts = append ( iface . extPorts , nat )
2013-04-05 01:58:01 -04:00
return nat , nil
}
type Nat struct {
Proto string
Frontend int
Backend int
}
func parseNat ( spec string ) ( * Nat , error ) {
var nat Nat
2013-06-10 09:56:43 -04:00
2013-06-11 18:46:23 -04:00
if strings . Contains ( spec , "/" ) {
specParts := strings . Split ( spec , "/" )
if len ( specParts ) != 2 {
return nil , fmt . Errorf ( "Invalid port format." )
}
proto := specParts [ 1 ]
spec = specParts [ 0 ]
if proto != "tcp" && proto != "udp" {
return nil , fmt . Errorf ( "Invalid port format: unknown protocol %v." , proto )
}
nat . Proto = proto
} else {
nat . Proto = "tcp"
}
2013-06-10 09:56:43 -04:00
if strings . Contains ( spec , ":" ) {
specParts := strings . Split ( spec , ":" )
if len ( specParts ) != 2 {
return nil , fmt . Errorf ( "Invalid port format." )
}
// If spec starts with ':', external and internal ports must be the same.
// This might fail if the requested external port is not available.
var sameFrontend bool
if len ( specParts [ 0 ] ) == 0 {
sameFrontend = true
} else {
front , err := strconv . ParseUint ( specParts [ 0 ] , 10 , 16 )
if err != nil {
return nil , err
}
nat . Frontend = int ( front )
}
back , err := strconv . ParseUint ( specParts [ 1 ] , 10 , 16 )
if err != nil {
return nil , err
}
nat . Backend = int ( back )
if sameFrontend {
nat . Frontend = nat . Backend
}
} else {
port , err := strconv . ParseUint ( spec , 10 , 16 )
if err != nil {
return nil , err
}
nat . Backend = int ( port )
2013-02-28 14:50:02 -05:00
}
2013-06-11 18:46:23 -04:00
2013-04-05 01:58:01 -04:00
return & nat , nil
2013-02-28 14:50:02 -05:00
}
// Release: Network cleanup - release all resources
2013-03-30 18:32:10 -04:00
func ( iface * NetworkInterface ) Release ( ) {
2013-07-21 20:49:09 -04:00
if iface . disabled {
return
}
2013-06-11 18:46:23 -04:00
for _ , nat := range iface . extPorts {
utils . Debugf ( "Unmaping %v/%v" , nat . Proto , nat . Frontend )
if err := iface . manager . portMapper . Unmap ( nat . Frontend , nat . Proto ) ; err != nil {
log . Printf ( "Unable to unmap port %v/%v: %v" , nat . Proto , nat . Frontend , err )
2013-02-28 14:50:02 -05:00
}
2013-06-11 18:46:23 -04:00
if nat . Proto == "tcp" {
if err := iface . manager . tcpPortAllocator . Release ( nat . Frontend ) ; err != nil {
log . Printf ( "Unable to release port tcp/%v: %v" , nat . Frontend , err )
}
} else if err := iface . manager . udpPortAllocator . Release ( nat . Frontend ) ; err != nil {
log . Printf ( "Unable to release port udp/%v: %v" , nat . Frontend , err )
2013-02-28 14:50:02 -05:00
}
}
2013-03-30 18:32:10 -04:00
iface . manager . ipAllocator . Release ( iface . IPNet . IP )
2013-02-28 14:50:02 -05:00
}
// Network Manager manages a set of network interfaces
// Only *one* manager per host machine should be used
type NetworkManager struct {
bridgeIface string
bridgeNetwork * net . IPNet
2013-06-11 18:46:23 -04:00
ipAllocator * IPAllocator
tcpPortAllocator * PortAllocator
udpPortAllocator * PortAllocator
portMapper * PortMapper
2013-07-21 20:49:09 -04:00
disabled bool
2013-02-28 14:50:02 -05:00
}
// Allocate a network interface
func ( manager * NetworkManager ) Allocate ( ) ( * NetworkInterface , error ) {
2013-07-21 20:49:09 -04:00
if manager . disabled {
return & NetworkInterface { disabled : true } , nil
}
2013-08-21 10:37:58 -04:00
var ip net . IP
var err error
ip , err = manager . ipAllocator . Acquire ( )
2013-02-25 13:45:23 -05:00
if err != nil {
2013-02-25 17:06:22 -05:00
return nil , err
2013-02-25 13:45:23 -05:00
}
2013-08-21 10:37:58 -04:00
// avoid duplicate IP
ipNum := ipToInt ( ip )
firstIP := manager . ipAllocator . network . IP . To4 ( ) . Mask ( manager . ipAllocator . network . Mask )
firstIPNum := ipToInt ( firstIP ) + 1
if firstIPNum == ipNum {
ip , err = manager . ipAllocator . Acquire ( )
if err != nil {
return nil , err
}
}
2013-02-25 17:06:22 -05:00
iface := & NetworkInterface {
2013-03-20 09:02:25 -04:00
IPNet : net . IPNet { IP : ip , Mask : manager . bridgeNetwork . Mask } ,
2013-02-28 14:50:02 -05:00
Gateway : manager . bridgeNetwork . IP ,
manager : manager ,
2013-02-25 17:06:22 -05:00
}
return iface , nil
}
2013-02-28 14:50:02 -05:00
func newNetworkManager ( bridgeIface string ) ( * NetworkManager , error ) {
2013-07-21 20:49:09 -04:00
if bridgeIface == DisableNetworkBridge {
manager := & NetworkManager {
disabled : true ,
}
return manager , nil
}
2013-02-28 14:50:02 -05:00
addr , err := getIfaceAddr ( bridgeIface )
if err != nil {
2013-04-03 18:57:57 -04:00
// If the iface is not found, try to create it
if err := CreateBridgeIface ( bridgeIface ) ; err != nil {
return nil , err
}
addr , err = getIfaceAddr ( bridgeIface )
if err != nil {
return nil , err
}
2013-02-28 14:50:02 -05:00
}
network := addr . ( * net . IPNet )
2013-03-30 18:32:10 -04:00
ipAllocator := newIPAllocator ( network )
2013-02-28 14:50:02 -05:00
2013-06-11 18:46:23 -04:00
tcpPortAllocator , err := newPortAllocator ( )
if err != nil {
return nil , err
}
udpPortAllocator , err := newPortAllocator ( )
2013-02-28 14:50:02 -05:00
if err != nil {
return nil , err
}
portMapper , err := newPortMapper ( )
2013-03-23 00:43:31 -04:00
if err != nil {
return nil , err
}
2013-02-28 14:50:02 -05:00
manager := & NetworkManager {
2013-06-11 18:46:23 -04:00
bridgeIface : bridgeIface ,
bridgeNetwork : network ,
ipAllocator : ipAllocator ,
tcpPortAllocator : tcpPortAllocator ,
udpPortAllocator : udpPortAllocator ,
portMapper : portMapper ,
2013-02-28 14:50:02 -05:00
}
return manager , nil
2013-02-25 13:45:23 -05:00
}