Skip to content

Commit 7a58331

Browse files
committed
feat: convert execs to ip to netlink calls
Not making direct exec calls to user binary interfaces has long been a principle of kube-router. When kube-router was first coded, the netlink library was missing significant features that forced us to exec out. However, now netlink seems to have most of the functionality that we need. This converts all of the places where we can use netlink to use the netlink functionality.
1 parent e8962dd commit 7a58331

7 files changed

+246
-168
lines changed

pkg/controllers/proxy/linux_networking.go

+136-65
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ import (
55
"fmt"
66
"net"
77
"os"
8-
"os/exec"
98
"path"
109
"strconv"
1110
"strings"
@@ -23,8 +22,10 @@ import (
2322
)
2423

2524
const (
26-
ipv4NetMaskBits = 32
27-
ipv6NetMaskBits = 128
25+
ipv4NetMaskBits = 32
26+
ipv4DefaultRoute = "0.0.0.0/0"
27+
ipv6NetMaskBits = 128
28+
ipv6DefaultRoute = "::/0"
2829

2930
// TODO: it's bad to rely on eth0 here. While this is inside the container's namespace and is determined by the
3031
// container runtime and so far we've been able to count on this being reliably set to eth0, it is possible that
@@ -66,7 +67,6 @@ type netlinkCalls interface {
6667

6768
func (ln *linuxNetworking) ipAddrDel(iface netlink.Link, ip string, nodeIP string) error {
6869
var netMask net.IPMask
69-
var ipRouteCmdArgs []string
7070
parsedIP := net.ParseIP(ip)
7171
parsedNodeIP := net.ParseIP(nodeIP)
7272
if parsedIP.To4() != nil {
@@ -76,7 +76,6 @@ func (ln *linuxNetworking) ipAddrDel(iface netlink.Link, ip string, nodeIP strin
7676
}
7777

7878
netMask = net.CIDRMask(ipv4NetMaskBits, ipv4NetMaskBits)
79-
ipRouteCmdArgs = make([]string, 0)
8079
} else {
8180
// If the IP family of the NodeIP and the VIP IP don't match, we can't proceed
8281
if parsedNodeIP.To4() != nil {
@@ -89,7 +88,6 @@ func (ln *linuxNetworking) ipAddrDel(iface netlink.Link, ip string, nodeIP strin
8988
}
9089

9190
netMask = net.CIDRMask(ipv6NetMaskBits, ipv6NetMaskBits)
92-
ipRouteCmdArgs = []string{"-6"}
9391
}
9492

9593
naddr := &netlink.Addr{IPNet: &net.IPNet{IP: parsedIP, Mask: netMask}, Scope: syscall.RT_SCOPE_LINK}
@@ -107,13 +105,20 @@ func (ln *linuxNetworking) ipAddrDel(iface netlink.Link, ip string, nodeIP strin
107105

108106
// Delete VIP addition to "local" rt table also, fail silently if not found (DSR special case)
109107
// #nosec G204
110-
ipRouteCmdArgs = append(ipRouteCmdArgs, "route", "delete", "local", ip, "dev", KubeDummyIf,
111-
"table", "local", "proto", "kernel", "scope", "host", "src", nodeIP, "table", "local")
112-
out, err := exec.Command("ip", ipRouteCmdArgs...).CombinedOutput()
108+
nRoute := &netlink.Route{
109+
Type: unix.RTN_LOCAL,
110+
Dst: &net.IPNet{IP: parsedIP, Mask: netMask},
111+
LinkIndex: iface.Attrs().Index,
112+
Table: syscall.RT_TABLE_LOCAL,
113+
Protocol: unix.RTPROT_KERNEL,
114+
Scope: syscall.RT_SCOPE_HOST,
115+
Src: parsedNodeIP,
116+
}
117+
err = netlink.RouteDel(nRoute)
113118
if err != nil {
114-
if !strings.Contains(string(out), "No such process") {
115-
klog.Errorf("Failed to delete route to service VIP %s configured on %s. Error: %v, Output: %s",
116-
ip, KubeDummyIf, err, out)
119+
if !strings.Contains(err.Error(), "no such process") {
120+
klog.Errorf("Failed to delete route to service VIP %s configured on %s. Error: %v",
121+
ip, iface.Attrs().Name, err)
117122
} else {
118123
klog.Warningf("got a No such process error while trying to remove route: %v (this is not normally bad "+
119124
"enough to stop processing)", err)
@@ -129,7 +134,6 @@ func (ln *linuxNetworking) ipAddrDel(iface netlink.Link, ip string, nodeIP strin
129134
// inside the container.
130135
func (ln *linuxNetworking) ipAddrAdd(iface netlink.Link, ip string, nodeIP string, addRoute bool) error {
131136
var netMask net.IPMask
132-
var ipRouteCmdArgs []string
133137
var isIPv6 bool
134138
parsedIP := net.ParseIP(ip)
135139
parsedNodeIP := net.ParseIP(nodeIP)
@@ -140,7 +144,6 @@ func (ln *linuxNetworking) ipAddrAdd(iface netlink.Link, ip string, nodeIP strin
140144
}
141145

142146
netMask = net.CIDRMask(ipv4NetMaskBits, ipv4NetMaskBits)
143-
ipRouteCmdArgs = make([]string, 0)
144147
isIPv6 = false
145148
} else {
146149
// If we're supposed to add a route and the IP family of the NodeIP and the VIP IP don't match, we can't proceed
@@ -149,11 +152,11 @@ func (ln *linuxNetworking) ipAddrAdd(iface netlink.Link, ip string, nodeIP strin
149152
}
150153

151154
netMask = net.CIDRMask(ipv6NetMaskBits, ipv6NetMaskBits)
152-
ipRouteCmdArgs = []string{"-6"}
153155
isIPv6 = true
154156
}
155157

156-
naddr := &netlink.Addr{IPNet: &net.IPNet{IP: parsedIP, Mask: netMask}, Scope: syscall.RT_SCOPE_LINK}
158+
ipPrefix := &net.IPNet{IP: parsedIP, Mask: netMask}
159+
naddr := &netlink.Addr{IPNet: ipPrefix, Scope: syscall.RT_SCOPE_LINK}
157160
err := netlink.AddrAdd(iface, naddr)
158161
if err != nil && err.Error() != IfaceHasAddr {
159162
klog.Errorf("failed to assign cluster ip %s to dummy interface: %s", naddr.IPNet.IP.String(), err.Error())
@@ -168,16 +171,24 @@ func (ln *linuxNetworking) ipAddrAdd(iface netlink.Link, ip string, nodeIP strin
168171
return nil
169172
}
170173

171-
// TODO: netlink.RouteReplace which is replacement for below command is not working as expected. Call succeeds but
172-
// route is not replaced. For now do it with command.
173-
// #nosec G204
174-
ipRouteCmdArgs = append(ipRouteCmdArgs, "route", "replace", "local", ip, "dev", KubeDummyIf,
175-
"table", "local", "proto", "kernel", "scope", "host", "src", nodeIP, "table", "local")
176-
177-
out, err := exec.Command("ip", ipRouteCmdArgs...).CombinedOutput()
174+
kubeDummyLink, err := netlink.LinkByName(KubeDummyIf)
178175
if err != nil {
179-
klog.Errorf("Failed to replace route to service VIP %s configured on %s. Error: %v, Output: %s",
180-
ip, KubeDummyIf, err, out)
176+
klog.Errorf("failed to get %s link due to %v", KubeDummyIf, err)
177+
return err
178+
}
179+
nRoute := &netlink.Route{
180+
Type: unix.RTN_LOCAL,
181+
Dst: ipPrefix,
182+
LinkIndex: kubeDummyLink.Attrs().Index,
183+
Table: syscall.RT_TABLE_LOCAL,
184+
Protocol: unix.RTPROT_KERNEL,
185+
Scope: syscall.RT_SCOPE_HOST,
186+
Src: parsedNodeIP,
187+
}
188+
err = netlink.RouteReplace(nRoute)
189+
if err != nil {
190+
klog.Errorf("Failed to replace route to service VIP %s configured on %s. Error: %v",
191+
ip, KubeDummyIf, err)
181192
return err
182193
}
183194

@@ -462,60 +473,109 @@ func (ln *linuxNetworking) setupPolicyRoutingForDSR(setupIPv4, setupIPv6 bool) e
462473
return fmt.Errorf("failed to setup policy routing required for DSR due to %v", err)
463474
}
464475

476+
loNetLink, err := netlink.LinkByName("lo")
477+
if err != nil {
478+
return fmt.Errorf("failed to get loopback interface due to %v", err)
479+
}
480+
465481
if setupIPv4 {
466-
out, err := exec.Command("ip", "route", "list", "table", customDSRRouteTableID).Output()
467-
if err != nil || !strings.Contains(string(out), " lo ") {
468-
if err = exec.Command("ip", "route", "add", "local", "default", "dev", "lo", "table",
469-
customDSRRouteTableID).Run(); err != nil {
470-
return fmt.Errorf("failed to add route in custom route table due to: %v", err)
482+
nFamily := netlink.FAMILY_V4
483+
_, defaultRouteCIDR, err := net.ParseCIDR(ipv4DefaultRoute)
484+
if err != nil {
485+
//nolint:goconst // This is a static value and should not be changed
486+
return fmt.Errorf("failed to parse default (%s) route (this is statically defined, so if you see this "+
487+
"error please report because something has gone very wrong) due to: %v", ipv4DefaultRoute, err)
488+
}
489+
nRoute := &netlink.Route{
490+
Type: unix.RTN_LOCAL,
491+
Dst: defaultRouteCIDR,
492+
LinkIndex: loNetLink.Attrs().Index,
493+
Table: customDSRRouteTableID,
494+
}
495+
routes, err := netlink.RouteListFiltered(nFamily, nRoute, netlink.RT_FILTER_TABLE|netlink.RT_FILTER_OIF)
496+
if err != nil || len(routes) < 1 {
497+
err = netlink.RouteAdd(nRoute)
498+
if err != nil {
499+
return fmt.Errorf("failed to add route to custom route table for DSR due to: %v", err)
471500
}
472501
}
473502
}
503+
474504
if setupIPv6 {
475-
out, err := exec.Command("ip", "-6", "route", "list", "table", customDSRRouteTableID).Output()
476-
if err != nil || !strings.Contains(string(out), " lo ") {
477-
if err = exec.Command("ip", "-6", "route", "add", "local", "default", "dev", "lo", "table",
478-
customDSRRouteTableID).Run(); err != nil {
479-
return fmt.Errorf("failed to add route in custom route table due to: %v", err)
505+
nFamily := netlink.FAMILY_V6
506+
_, defaultRouteCIDR, err := net.ParseCIDR(ipv6DefaultRoute)
507+
if err != nil {
508+
return fmt.Errorf("failed to parse default (%s) route (this is statically defined, so if you see this "+
509+
"error please report because something has gone very wrong) due to: %v", ipv6DefaultRoute, err)
510+
}
511+
nRoute := &netlink.Route{
512+
Type: unix.RTN_LOCAL,
513+
Dst: defaultRouteCIDR,
514+
LinkIndex: loNetLink.Attrs().Index,
515+
Table: customDSRRouteTableID,
516+
}
517+
routes, err := netlink.RouteListFiltered(nFamily, nRoute, netlink.RT_FILTER_TABLE|netlink.RT_FILTER_OIF)
518+
if err != nil || len(routes) < 1 {
519+
err = netlink.RouteAdd(nRoute)
520+
if err != nil {
521+
return fmt.Errorf("failed to add route to custom route table for DSR due to: %v", err)
480522
}
481523
}
482524
}
525+
483526
return nil
484527
}
485528

486529
// For DSR it is required that node needs to know how to route external IP. Otherwise when endpoint
487530
// directly responds back with source IP as external IP kernel will treat as martian packet.
488531
// To prevent martian packets add route to external IP through the `kube-bridge` interface
489532
// setupRoutesForExternalIPForDSR: setups routing so that kernel does not think return packets as martians
490-
491533
func (ln *linuxNetworking) setupRoutesForExternalIPForDSR(serviceInfoMap serviceInfoMap,
492534
setupIPv4, setupIPv6 bool) error {
493535
err := utils.RouteTableAdd(externalIPRouteTableID, externalIPRouteTableName)
494536
if err != nil {
495537
return fmt.Errorf("failed to setup policy routing required for DSR due to %v", err)
496538
}
497539

498-
setupIPRulesAndRoutes := func(ipArgs []string) error {
499-
out, err := runIPCommandsWithArgs(ipArgs, "rule", "list").Output()
540+
setupIPRulesAndRoutes := func(isIPv6 bool) error {
541+
nFamily := netlink.FAMILY_V4
542+
_, defaultPrefixCIDR, err := net.ParseCIDR(ipv4DefaultRoute)
543+
if isIPv6 {
544+
nFamily = netlink.FAMILY_V6
545+
_, defaultPrefixCIDR, err = net.ParseCIDR(ipv6DefaultRoute)
546+
}
547+
if err != nil {
548+
return fmt.Errorf("failed to parse default route (this is statically defined, so if you see this "+
549+
"error please report because something has gone very wrong) due to: %v", err)
550+
}
551+
552+
nRule := &netlink.Rule{
553+
Priority: defaultDSRPolicyRulePriority,
554+
Src: defaultPrefixCIDR,
555+
Table: externalIPRouteTableID,
556+
}
557+
rules, err := netlink.RuleListFiltered(nFamily, nRule,
558+
netlink.RT_FILTER_TABLE|netlink.RT_FILTER_SRC|netlink.RT_FILTER_PRIORITY)
500559
if err != nil {
501-
return fmt.Errorf("failed to verify if `ip rule add prio 32765 from all lookup external_ip` exists due to: %v",
502-
err)
560+
return fmt.Errorf("failed to list rule for external IP's and verify if `ip rule add prio 32765 from all "+
561+
"lookup external_ip` exists due to: %v", err)
503562
}
504563

505-
if !(strings.Contains(string(out), externalIPRouteTableName) ||
506-
strings.Contains(string(out), externalIPRouteTableID)) {
507-
err = runIPCommandsWithArgs(ipArgs, "rule", "add", "prio", "32765", "from", "all", "lookup",
508-
externalIPRouteTableID).Run()
564+
if len(rules) < 1 {
565+
err = netlink.RuleAdd(nRule)
509566
if err != nil {
510567
klog.Infof("Failed to add policy rule `ip rule add prio 32765 from all lookup external_ip` due to %v",
511-
err.Error())
568+
err)
512569
return fmt.Errorf("failed to add policy rule `ip rule add prio 32765 from all lookup external_ip` "+
513570
"due to %v", err)
514571
}
515572
}
516573

517-
out, _ = runIPCommandsWithArgs(ipArgs, "route", "list", "table", externalIPRouteTableID).Output()
518-
outStr := string(out)
574+
kubeBridgeLink, err := netlink.LinkByName(KubeBridgeIf)
575+
if err != nil {
576+
return fmt.Errorf("failed to get kube-bridge interface due to %v", err)
577+
}
578+
519579
activeExternalIPs := make(map[string]bool)
520580
for _, svc := range serviceInfoMap {
521581
for _, externalIP := range svc.externalIPs {
@@ -528,9 +588,21 @@ func (ln *linuxNetworking) setupRoutesForExternalIPForDSR(serviceInfoMap service
528588

529589
activeExternalIPs[externalIP] = true
530590

531-
if !strings.Contains(outStr, externalIP) {
532-
if err = runIPCommandsWithArgs(ipArgs, "route", "add", externalIP, "dev", "kube-bridge", "table",
533-
externalIPRouteTableID).Run(); err != nil {
591+
nSrcIP := net.ParseIP(externalIP)
592+
nRoute := &netlink.Route{
593+
Src: nSrcIP,
594+
LinkIndex: kubeBridgeLink.Attrs().Index,
595+
Table: externalIPRouteTableID,
596+
}
597+
598+
routes, err := netlink.RouteListFiltered(nFamily, nRoute,
599+
netlink.RT_FILTER_SRC|netlink.RT_FILTER_TABLE|netlink.RT_FILTER_OIF)
600+
if err != nil {
601+
return fmt.Errorf("failed to list route for external IP's due to: %s", err)
602+
}
603+
if len(routes) < 1 {
604+
err = netlink.RouteAdd(nRoute)
605+
if err != nil {
534606
klog.Errorf("Failed to add route for %s in custom route table for external IP's due to: %v",
535607
externalIP, err)
536608
continue
@@ -540,19 +612,18 @@ func (ln *linuxNetworking) setupRoutesForExternalIPForDSR(serviceInfoMap service
540612
}
541613

542614
// check if there are any pbr in externalIPRouteTableID for external IP's
543-
if len(outStr) > 0 {
544-
// clean up stale external IPs
545-
for _, line := range strings.Split(strings.Trim(outStr, "\n"), "\n") {
546-
route := strings.Split(strings.Trim(line, " "), " ")
547-
ip := route[0]
548-
if !activeExternalIPs[ip] {
549-
args := []string{"route", "del", "table", externalIPRouteTableID}
550-
args = append(args, route...)
551-
if err = runIPCommandsWithArgs(ipArgs, args...).Run(); err != nil {
552-
klog.Errorf("Failed to del route for %v in custom route table for external IP's due to: %s",
553-
ip, err)
554-
continue
555-
}
615+
routes, err := netlink.RouteList(nil, nFamily)
616+
if err != nil {
617+
return fmt.Errorf("failed to list route for external IP's due to: %s", err)
618+
}
619+
for idx, route := range routes {
620+
ip := route.Src.String()
621+
if !activeExternalIPs[ip] {
622+
err = netlink.RouteDel(&routes[idx])
623+
if err != nil {
624+
klog.Errorf("Failed to del route for %v in custom route table for external IP's due to: %s",
625+
ip, err)
626+
continue
556627
}
557628
}
558629
}
@@ -561,13 +632,13 @@ func (ln *linuxNetworking) setupRoutesForExternalIPForDSR(serviceInfoMap service
561632
}
562633

563634
if setupIPv4 {
564-
err = setupIPRulesAndRoutes([]string{})
635+
err = setupIPRulesAndRoutes(false)
565636
if err != nil {
566637
return err
567638
}
568639
}
569640
if setupIPv6 {
570-
err = setupIPRulesAndRoutes([]string{"-6"})
641+
err = setupIPRulesAndRoutes(true)
571642
if err != nil {
572643
return err
573644
}

0 commit comments

Comments
 (0)