mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-23 11:50:44 +00:00
Merge pull request #114750 from aojea/cleanup_allocator
refactor current ipallocator
This commit is contained in:
commit
6dc493bb83
@ -17,7 +17,6 @@ limitations under the License.
|
|||||||
package ipallocator
|
package ipallocator
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"errors"
|
|
||||||
"fmt"
|
"fmt"
|
||||||
"math/big"
|
"math/big"
|
||||||
"net"
|
"net"
|
||||||
@ -27,38 +26,6 @@ import (
|
|||||||
netutils "k8s.io/utils/net"
|
netutils "k8s.io/utils/net"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Interface manages the allocation of IP addresses out of a range. Interface
|
|
||||||
// should be threadsafe.
|
|
||||||
type Interface interface {
|
|
||||||
Allocate(net.IP) error
|
|
||||||
AllocateNext() (net.IP, error)
|
|
||||||
Release(net.IP) error
|
|
||||||
ForEach(func(net.IP))
|
|
||||||
CIDR() net.IPNet
|
|
||||||
IPFamily() api.IPFamily
|
|
||||||
Has(ip net.IP) bool
|
|
||||||
Destroy()
|
|
||||||
EnableMetrics()
|
|
||||||
|
|
||||||
// DryRun offers a way to try operations without persisting them.
|
|
||||||
DryRun() Interface
|
|
||||||
}
|
|
||||||
|
|
||||||
var (
|
|
||||||
ErrFull = errors.New("range is full")
|
|
||||||
ErrAllocated = errors.New("provided IP is already allocated")
|
|
||||||
ErrMismatchedNetwork = errors.New("the provided network does not match the current range")
|
|
||||||
)
|
|
||||||
|
|
||||||
type ErrNotInRange struct {
|
|
||||||
IP net.IP
|
|
||||||
ValidRange string
|
|
||||||
}
|
|
||||||
|
|
||||||
func (e *ErrNotInRange) Error() string {
|
|
||||||
return fmt.Sprintf("the provided IP (%v) is not in the valid range. The range of valid IPs is %s", e.IP, e.ValidRange)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Range is a contiguous block of IPs that can be allocated atomically.
|
// Range is a contiguous block of IPs that can be allocated atomically.
|
||||||
//
|
//
|
||||||
// The internal structure of the range is:
|
// The internal structure of the range is:
|
||||||
@ -89,6 +56,8 @@ type Range struct {
|
|||||||
metrics metricsRecorderInterface
|
metrics metricsRecorderInterface
|
||||||
}
|
}
|
||||||
|
|
||||||
|
var _ Interface = (*Range)(nil)
|
||||||
|
|
||||||
// New creates a Range over a net.IPNet, calling allocatorFactory to construct the backing store.
|
// New creates a Range over a net.IPNet, calling allocatorFactory to construct the backing store.
|
||||||
func New(cidr *net.IPNet, allocatorFactory allocator.AllocatorWithOffsetFactory) (*Range, error) {
|
func New(cidr *net.IPNet, allocatorFactory allocator.AllocatorWithOffsetFactory) (*Range, error) {
|
||||||
max := netutils.RangeSize(cidr)
|
max := netutils.RangeSize(cidr)
|
@ -51,6 +51,19 @@ func TestAllocate(t *testing.T) {
|
|||||||
},
|
},
|
||||||
alreadyAllocated: "192.168.1.1",
|
alreadyAllocated: "192.168.1.1",
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
name: "IPv4 large",
|
||||||
|
cidr: "10.0.0.0/15",
|
||||||
|
family: api.IPv4Protocol,
|
||||||
|
free: 131070,
|
||||||
|
released: "10.0.0.5",
|
||||||
|
outOfRange: []string{
|
||||||
|
"10.0.0.0", // reserved (base address)
|
||||||
|
"10.15.255.255", // reserved (broadcast address)
|
||||||
|
"10.255.255.2", // not in range
|
||||||
|
},
|
||||||
|
alreadyAllocated: "10.0.0.1",
|
||||||
|
},
|
||||||
{
|
{
|
||||||
name: "IPv6",
|
name: "IPv6",
|
||||||
cidr: "2001:db8:1::/48",
|
cidr: "2001:db8:1::/48",
|
||||||
@ -67,96 +80,97 @@ func TestAllocate(t *testing.T) {
|
|||||||
},
|
},
|
||||||
}
|
}
|
||||||
for _, tc := range testCases {
|
for _, tc := range testCases {
|
||||||
_, cidr, err := netutils.ParseCIDRSloppy(tc.cidr)
|
t.Run(tc.name, func(t *testing.T) {
|
||||||
if err != nil {
|
_, cidr, err := netutils.ParseCIDRSloppy(tc.cidr)
|
||||||
t.Fatal(err)
|
|
||||||
}
|
|
||||||
r, err := NewInMemory(cidr)
|
|
||||||
if err != nil {
|
|
||||||
t.Fatal(err)
|
|
||||||
}
|
|
||||||
t.Logf("base: %v", r.base.Bytes())
|
|
||||||
if f := r.Free(); f != tc.free {
|
|
||||||
t.Errorf("[%s] wrong free: expected %d, got %d", tc.name, tc.free, f)
|
|
||||||
}
|
|
||||||
|
|
||||||
rCIDR := r.CIDR()
|
|
||||||
if rCIDR.String() != tc.cidr {
|
|
||||||
t.Errorf("[%s] wrong CIDR: expected %v, got %v", tc.name, tc.cidr, rCIDR.String())
|
|
||||||
}
|
|
||||||
|
|
||||||
if r.IPFamily() != tc.family {
|
|
||||||
t.Errorf("[%s] wrong IP family: expected %v, got %v", tc.name, tc.family, r.IPFamily())
|
|
||||||
}
|
|
||||||
|
|
||||||
if f := r.Used(); f != 0 {
|
|
||||||
t.Errorf("[%s]: wrong used: expected %d, got %d", tc.name, 0, f)
|
|
||||||
}
|
|
||||||
found := sets.NewString()
|
|
||||||
count := 0
|
|
||||||
for r.Free() > 0 {
|
|
||||||
ip, err := r.AllocateNext()
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("[%s] error @ %d: %v", tc.name, count, err)
|
|
||||||
}
|
|
||||||
count++
|
|
||||||
if !cidr.Contains(ip) {
|
|
||||||
t.Fatalf("[%s] allocated %s which is outside of %s", tc.name, ip, cidr)
|
|
||||||
}
|
|
||||||
if found.Has(ip.String()) {
|
|
||||||
t.Fatalf("[%s] allocated %s twice @ %d", tc.name, ip, count)
|
|
||||||
}
|
|
||||||
found.Insert(ip.String())
|
|
||||||
}
|
|
||||||
if _, err := r.AllocateNext(); err != ErrFull {
|
|
||||||
t.Fatal(err)
|
|
||||||
}
|
|
||||||
|
|
||||||
released := netutils.ParseIPSloppy(tc.released)
|
|
||||||
if err := r.Release(released); err != nil {
|
|
||||||
t.Fatal(err)
|
|
||||||
}
|
|
||||||
if f := r.Free(); f != 1 {
|
|
||||||
t.Errorf("[%s] wrong free: expected %d, got %d", tc.name, 1, f)
|
|
||||||
}
|
|
||||||
if f := r.Used(); f != (tc.free - 1) {
|
|
||||||
t.Errorf("[%s] wrong free: expected %d, got %d", tc.name, tc.free-1, f)
|
|
||||||
}
|
|
||||||
ip, err := r.AllocateNext()
|
|
||||||
if err != nil {
|
|
||||||
t.Fatal(err)
|
|
||||||
}
|
|
||||||
if !released.Equal(ip) {
|
|
||||||
t.Errorf("[%s] unexpected %s : %s", tc.name, ip, released)
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := r.Release(released); err != nil {
|
|
||||||
t.Fatal(err)
|
|
||||||
}
|
|
||||||
for _, outOfRange := range tc.outOfRange {
|
|
||||||
err = r.Allocate(netutils.ParseIPSloppy(outOfRange))
|
|
||||||
if _, ok := err.(*ErrNotInRange); !ok {
|
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
}
|
r, err := NewInMemory(cidr)
|
||||||
if err := r.Allocate(netutils.ParseIPSloppy(tc.alreadyAllocated)); err != ErrAllocated {
|
if err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
if f := r.Free(); f != 1 {
|
if f := r.Free(); f != tc.free {
|
||||||
t.Errorf("[%s] wrong free: expected %d, got %d", tc.name, 1, f)
|
t.Errorf("[%s] wrong free: expected %d, got %d", tc.name, tc.free, f)
|
||||||
}
|
}
|
||||||
if f := r.Used(); f != (tc.free - 1) {
|
|
||||||
t.Errorf("[%s] wrong free: expected %d, got %d", tc.name, tc.free-1, f)
|
rCIDR := r.CIDR()
|
||||||
}
|
if rCIDR.String() != tc.cidr {
|
||||||
if err := r.Allocate(released); err != nil {
|
t.Errorf("[%s] wrong CIDR: expected %v, got %v", tc.name, tc.cidr, rCIDR.String())
|
||||||
t.Fatal(err)
|
}
|
||||||
}
|
|
||||||
if f := r.Free(); f != 0 {
|
if r.IPFamily() != tc.family {
|
||||||
t.Errorf("[%s] wrong free: expected %d, got %d", tc.name, 0, f)
|
t.Errorf("[%s] wrong IP family: expected %v, got %v", tc.name, tc.family, r.IPFamily())
|
||||||
}
|
}
|
||||||
if f := r.Used(); f != tc.free {
|
|
||||||
t.Errorf("[%s] wrong free: expected %d, got %d", tc.name, tc.free, f)
|
if f := r.Used(); f != 0 {
|
||||||
}
|
t.Errorf("[%s]: wrong used: expected %d, got %d", tc.name, 0, f)
|
||||||
|
}
|
||||||
|
found := sets.NewString()
|
||||||
|
count := 0
|
||||||
|
for r.Free() > 0 {
|
||||||
|
ip, err := r.AllocateNext()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("[%s] error @ %d: %v", tc.name, count, err)
|
||||||
|
}
|
||||||
|
count++
|
||||||
|
if !cidr.Contains(ip) {
|
||||||
|
t.Fatalf("[%s] allocated %s which is outside of %s", tc.name, ip, cidr)
|
||||||
|
}
|
||||||
|
if found.Has(ip.String()) {
|
||||||
|
t.Fatalf("[%s] allocated %s twice @ %d", tc.name, ip, count)
|
||||||
|
}
|
||||||
|
found.Insert(ip.String())
|
||||||
|
}
|
||||||
|
if _, err := r.AllocateNext(); err != ErrFull {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
released := netutils.ParseIPSloppy(tc.released)
|
||||||
|
if err := r.Release(released); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if f := r.Free(); f != 1 {
|
||||||
|
t.Errorf("[%s] wrong free: expected %d, got %d", tc.name, 1, f)
|
||||||
|
}
|
||||||
|
if f := r.Used(); f != (tc.free - 1) {
|
||||||
|
t.Errorf("[%s] wrong free: expected %d, got %d", tc.name, tc.free-1, f)
|
||||||
|
}
|
||||||
|
ip, err := r.AllocateNext()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if !released.Equal(ip) {
|
||||||
|
t.Errorf("[%s] unexpected %s : %s", tc.name, ip, released)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := r.Release(released); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
for _, outOfRange := range tc.outOfRange {
|
||||||
|
err = r.Allocate(netutils.ParseIPSloppy(outOfRange))
|
||||||
|
if _, ok := err.(*ErrNotInRange); !ok {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if err := r.Allocate(netutils.ParseIPSloppy(tc.alreadyAllocated)); err != ErrAllocated {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if f := r.Free(); f != 1 {
|
||||||
|
t.Errorf("[%s] wrong free: expected %d, got %d", tc.name, 1, f)
|
||||||
|
}
|
||||||
|
if f := r.Used(); f != (tc.free - 1) {
|
||||||
|
t.Errorf("[%s] wrong free: expected %d, got %d", tc.name, tc.free-1, f)
|
||||||
|
}
|
||||||
|
if err := r.Allocate(released); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if f := r.Free(); f != 0 {
|
||||||
|
t.Errorf("[%s] wrong free: expected %d, got %d", tc.name, 0, f)
|
||||||
|
}
|
||||||
|
if f := r.Used(); f != tc.free {
|
||||||
|
t.Errorf("[%s] wrong free: expected %d, got %d", tc.name, tc.free, f)
|
||||||
|
}
|
||||||
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -270,8 +284,6 @@ func TestAllocateSmall(t *testing.T) {
|
|||||||
if r.max != 2 {
|
if r.max != 2 {
|
||||||
t.Fatalf("expected range equal to 2, got: %v", r)
|
t.Fatalf("expected range equal to 2, got: %v", r)
|
||||||
}
|
}
|
||||||
|
|
||||||
t.Logf("allocated: %v", found)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestForEach(t *testing.T) {
|
func TestForEach(t *testing.T) {
|
||||||
@ -827,3 +839,38 @@ func Test_calculateRangeOffset(t *testing.T) {
|
|||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// cpu: Intel(R) Xeon(R) CPU E5-2678 v3 @ 2.50GHz
|
||||||
|
// BenchmarkAllocateNextIPv4
|
||||||
|
// BenchmarkAllocateNextIPv4-24 1175304 870.9 ns/op 1337 B/op 11 allocs/op
|
||||||
|
func BenchmarkAllocateNextIPv4Size1048574(b *testing.B) {
|
||||||
|
_, cidr, err := netutils.ParseCIDRSloppy("10.0.0.0/12")
|
||||||
|
if err != nil {
|
||||||
|
b.Fatal(err)
|
||||||
|
}
|
||||||
|
r, err := NewInMemory(cidr)
|
||||||
|
if err != nil {
|
||||||
|
b.Fatal(err)
|
||||||
|
}
|
||||||
|
for n := 0; n < b.N; n++ {
|
||||||
|
r.AllocateNext()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// This is capped to 65535
|
||||||
|
// cpu: Intel(R) Xeon(R) CPU E5-2678 v3 @ 2.50GHz
|
||||||
|
// BenchmarkAllocateNextIPv6
|
||||||
|
// BenchmarkAllocateNextIPv6-24 5779431 194.0 ns/op 18 B/op 2 allocs/op
|
||||||
|
func BenchmarkAllocateNextIPv6Size65535(b *testing.B) {
|
||||||
|
_, cidr, err := netutils.ParseCIDRSloppy("fd00::/24")
|
||||||
|
if err != nil {
|
||||||
|
b.Fatal(err)
|
||||||
|
}
|
||||||
|
r, err := NewInMemory(cidr)
|
||||||
|
if err != nil {
|
||||||
|
b.Fatal(err)
|
||||||
|
}
|
||||||
|
for n := 0; n < b.N; n++ {
|
||||||
|
r.AllocateNext()
|
||||||
|
}
|
||||||
|
}
|
57
pkg/registry/core/service/ipallocator/interfaces.go
Normal file
57
pkg/registry/core/service/ipallocator/interfaces.go
Normal file
@ -0,0 +1,57 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2022 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package ipallocator
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"net"
|
||||||
|
|
||||||
|
api "k8s.io/kubernetes/pkg/apis/core"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Interface manages the allocation of IP addresses out of a range. Interface
|
||||||
|
// should be threadsafe.
|
||||||
|
type Interface interface {
|
||||||
|
Allocate(net.IP) error
|
||||||
|
AllocateNext() (net.IP, error)
|
||||||
|
Release(net.IP) error
|
||||||
|
ForEach(func(net.IP))
|
||||||
|
CIDR() net.IPNet
|
||||||
|
IPFamily() api.IPFamily
|
||||||
|
Has(ip net.IP) bool
|
||||||
|
Destroy()
|
||||||
|
EnableMetrics()
|
||||||
|
|
||||||
|
// DryRun offers a way to try operations without persisting them.
|
||||||
|
DryRun() Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
var (
|
||||||
|
ErrFull = errors.New("range is full")
|
||||||
|
ErrAllocated = errors.New("provided IP is already allocated")
|
||||||
|
ErrMismatchedNetwork = errors.New("the provided network does not match the current range")
|
||||||
|
)
|
||||||
|
|
||||||
|
type ErrNotInRange struct {
|
||||||
|
IP net.IP
|
||||||
|
ValidRange string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e *ErrNotInRange) Error() string {
|
||||||
|
return fmt.Sprintf("the provided IP (%v) is not in the valid range. The range of valid IPs is %s", e.IP, e.ValidRange)
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user