5
5
"fmt"
6
6
"net"
7
7
"os"
8
- "os/exec"
9
8
"path"
10
9
"strconv"
11
10
"strings"
@@ -23,8 +22,10 @@ import (
23
22
)
24
23
25
24
const (
26
- ipv4NetMaskBits = 32
27
- ipv6NetMaskBits = 128
25
+ ipv4NetMaskBits = 32
26
+ ipv4DefaultRoute = "0.0.0.0/0"
27
+ ipv6NetMaskBits = 128
28
+ ipv6DefaultRoute = "::/0"
28
29
29
30
// TODO: it's bad to rely on eth0 here. While this is inside the container's namespace and is determined by the
30
31
// container runtime and so far we've been able to count on this being reliably set to eth0, it is possible that
@@ -66,7 +67,6 @@ type netlinkCalls interface {
66
67
67
68
func (ln * linuxNetworking ) ipAddrDel (iface netlink.Link , ip string , nodeIP string ) error {
68
69
var netMask net.IPMask
69
- var ipRouteCmdArgs []string
70
70
parsedIP := net .ParseIP (ip )
71
71
parsedNodeIP := net .ParseIP (nodeIP )
72
72
if parsedIP .To4 () != nil {
@@ -76,7 +76,6 @@ func (ln *linuxNetworking) ipAddrDel(iface netlink.Link, ip string, nodeIP strin
76
76
}
77
77
78
78
netMask = net .CIDRMask (ipv4NetMaskBits , ipv4NetMaskBits )
79
- ipRouteCmdArgs = make ([]string , 0 )
80
79
} else {
81
80
// If the IP family of the NodeIP and the VIP IP don't match, we can't proceed
82
81
if parsedNodeIP .To4 () != nil {
@@ -89,7 +88,6 @@ func (ln *linuxNetworking) ipAddrDel(iface netlink.Link, ip string, nodeIP strin
89
88
}
90
89
91
90
netMask = net .CIDRMask (ipv6NetMaskBits , ipv6NetMaskBits )
92
- ipRouteCmdArgs = []string {"-6" }
93
91
}
94
92
95
93
naddr := & netlink.Addr {IPNet : & net.IPNet {IP : parsedIP , Mask : netMask }, Scope : syscall .RT_SCOPE_LINK }
@@ -107,13 +105,20 @@ func (ln *linuxNetworking) ipAddrDel(iface netlink.Link, ip string, nodeIP strin
107
105
108
106
// Delete VIP addition to "local" rt table also, fail silently if not found (DSR special case)
109
107
// #nosec G204
110
- ipRouteCmdArgs = append (ipRouteCmdArgs , "route" , "delete" , "local" , ip , "dev" , KubeDummyIf ,
111
- "table" , "local" , "proto" , "kernel" , "scope" , "host" , "src" , nodeIP , "table" , "local" )
112
- out , err := exec .Command ("ip" , ipRouteCmdArgs ... ).CombinedOutput ()
108
+ nRoute := & netlink.Route {
109
+ Type : unix .RTN_LOCAL ,
110
+ Dst : & net.IPNet {IP : parsedIP , Mask : netMask },
111
+ LinkIndex : iface .Attrs ().Index ,
112
+ Table : syscall .RT_TABLE_LOCAL ,
113
+ Protocol : unix .RTPROT_KERNEL ,
114
+ Scope : syscall .RT_SCOPE_HOST ,
115
+ Src : parsedNodeIP ,
116
+ }
117
+ err = netlink .RouteDel (nRoute )
113
118
if err != nil {
114
- if ! strings .Contains (string ( out ), "No such process" ) {
115
- klog .Errorf ("Failed to delete route to service VIP %s configured on %s. Error: %v, Output: %s " ,
116
- ip , KubeDummyIf , err , out )
119
+ if ! strings .Contains (err . Error ( ), "no such process" ) {
120
+ klog .Errorf ("Failed to delete route to service VIP %s configured on %s. Error: %v" ,
121
+ ip , iface . Attrs (). Name , err )
117
122
} else {
118
123
klog .Warningf ("got a No such process error while trying to remove route: %v (this is not normally bad " +
119
124
"enough to stop processing)" , err )
@@ -129,7 +134,6 @@ func (ln *linuxNetworking) ipAddrDel(iface netlink.Link, ip string, nodeIP strin
129
134
// inside the container.
130
135
func (ln * linuxNetworking ) ipAddrAdd (iface netlink.Link , ip string , nodeIP string , addRoute bool ) error {
131
136
var netMask net.IPMask
132
- var ipRouteCmdArgs []string
133
137
var isIPv6 bool
134
138
parsedIP := net .ParseIP (ip )
135
139
parsedNodeIP := net .ParseIP (nodeIP )
@@ -140,7 +144,6 @@ func (ln *linuxNetworking) ipAddrAdd(iface netlink.Link, ip string, nodeIP strin
140
144
}
141
145
142
146
netMask = net .CIDRMask (ipv4NetMaskBits , ipv4NetMaskBits )
143
- ipRouteCmdArgs = make ([]string , 0 )
144
147
isIPv6 = false
145
148
} else {
146
149
// If we're supposed to add a route and the IP family of the NodeIP and the VIP IP don't match, we can't proceed
@@ -149,11 +152,11 @@ func (ln *linuxNetworking) ipAddrAdd(iface netlink.Link, ip string, nodeIP strin
149
152
}
150
153
151
154
netMask = net .CIDRMask (ipv6NetMaskBits , ipv6NetMaskBits )
152
- ipRouteCmdArgs = []string {"-6" }
153
155
isIPv6 = true
154
156
}
155
157
156
- naddr := & netlink.Addr {IPNet : & net.IPNet {IP : parsedIP , Mask : netMask }, Scope : syscall .RT_SCOPE_LINK }
158
+ ipPrefix := & net.IPNet {IP : parsedIP , Mask : netMask }
159
+ naddr := & netlink.Addr {IPNet : ipPrefix , Scope : syscall .RT_SCOPE_LINK }
157
160
err := netlink .AddrAdd (iface , naddr )
158
161
if err != nil && err .Error () != IfaceHasAddr {
159
162
klog .Errorf ("failed to assign cluster ip %s to dummy interface: %s" , naddr .IPNet .IP .String (), err .Error ())
@@ -168,16 +171,24 @@ func (ln *linuxNetworking) ipAddrAdd(iface netlink.Link, ip string, nodeIP strin
168
171
return nil
169
172
}
170
173
171
- // TODO: netlink.RouteReplace which is replacement for below command is not working as expected. Call succeeds but
172
- // route is not replaced. For now do it with command.
173
- // #nosec G204
174
- ipRouteCmdArgs = append (ipRouteCmdArgs , "route" , "replace" , "local" , ip , "dev" , KubeDummyIf ,
175
- "table" , "local" , "proto" , "kernel" , "scope" , "host" , "src" , nodeIP , "table" , "local" )
176
-
177
- out , err := exec .Command ("ip" , ipRouteCmdArgs ... ).CombinedOutput ()
174
+ kubeDummyLink , err := netlink .LinkByName (KubeDummyIf )
178
175
if err != nil {
179
- klog .Errorf ("Failed to replace route to service VIP %s configured on %s. Error: %v, Output: %s" ,
180
- ip , KubeDummyIf , err , out )
176
+ klog .Errorf ("failed to get %s link due to %v" , KubeDummyIf , err )
177
+ return err
178
+ }
179
+ nRoute := & netlink.Route {
180
+ Type : unix .RTN_LOCAL ,
181
+ Dst : ipPrefix ,
182
+ LinkIndex : kubeDummyLink .Attrs ().Index ,
183
+ Table : syscall .RT_TABLE_LOCAL ,
184
+ Protocol : unix .RTPROT_KERNEL ,
185
+ Scope : syscall .RT_SCOPE_HOST ,
186
+ Src : parsedNodeIP ,
187
+ }
188
+ err = netlink .RouteReplace (nRoute )
189
+ if err != nil {
190
+ klog .Errorf ("Failed to replace route to service VIP %s configured on %s. Error: %v" ,
191
+ ip , KubeDummyIf , err )
181
192
return err
182
193
}
183
194
@@ -462,60 +473,109 @@ func (ln *linuxNetworking) setupPolicyRoutingForDSR(setupIPv4, setupIPv6 bool) e
462
473
return fmt .Errorf ("failed to setup policy routing required for DSR due to %v" , err )
463
474
}
464
475
476
+ loNetLink , err := netlink .LinkByName ("lo" )
477
+ if err != nil {
478
+ return fmt .Errorf ("failed to get loopback interface due to %v" , err )
479
+ }
480
+
465
481
if setupIPv4 {
466
- out , err := exec .Command ("ip" , "route" , "list" , "table" , customDSRRouteTableID ).Output ()
467
- if err != nil || ! strings .Contains (string (out ), " lo " ) {
468
- if err = exec .Command ("ip" , "route" , "add" , "local" , "default" , "dev" , "lo" , "table" ,
469
- customDSRRouteTableID ).Run (); err != nil {
470
- return fmt .Errorf ("failed to add route in custom route table due to: %v" , err )
482
+ nFamily := netlink .FAMILY_V4
483
+ _ , defaultRouteCIDR , err := net .ParseCIDR (ipv4DefaultRoute )
484
+ if err != nil {
485
+ //nolint:goconst // This is a static value and should not be changed
486
+ return fmt .Errorf ("failed to parse default (%s) route (this is statically defined, so if you see this " +
487
+ "error please report because something has gone very wrong) due to: %v" , ipv4DefaultRoute , err )
488
+ }
489
+ nRoute := & netlink.Route {
490
+ Type : unix .RTN_LOCAL ,
491
+ Dst : defaultRouteCIDR ,
492
+ LinkIndex : loNetLink .Attrs ().Index ,
493
+ Table : customDSRRouteTableID ,
494
+ }
495
+ routes , err := netlink .RouteListFiltered (nFamily , nRoute , netlink .RT_FILTER_TABLE | netlink .RT_FILTER_OIF )
496
+ if err != nil || len (routes ) < 1 {
497
+ err = netlink .RouteAdd (nRoute )
498
+ if err != nil {
499
+ return fmt .Errorf ("failed to add route to custom route table for DSR due to: %v" , err )
471
500
}
472
501
}
473
502
}
503
+
474
504
if setupIPv6 {
475
- out , err := exec .Command ("ip" , "-6" , "route" , "list" , "table" , customDSRRouteTableID ).Output ()
476
- if err != nil || ! strings .Contains (string (out ), " lo " ) {
477
- if err = exec .Command ("ip" , "-6" , "route" , "add" , "local" , "default" , "dev" , "lo" , "table" ,
478
- customDSRRouteTableID ).Run (); err != nil {
479
- return fmt .Errorf ("failed to add route in custom route table due to: %v" , err )
505
+ nFamily := netlink .FAMILY_V6
506
+ _ , defaultRouteCIDR , err := net .ParseCIDR (ipv6DefaultRoute )
507
+ if err != nil {
508
+ return fmt .Errorf ("failed to parse default (%s) route (this is statically defined, so if you see this " +
509
+ "error please report because something has gone very wrong) due to: %v" , ipv6DefaultRoute , err )
510
+ }
511
+ nRoute := & netlink.Route {
512
+ Type : unix .RTN_LOCAL ,
513
+ Dst : defaultRouteCIDR ,
514
+ LinkIndex : loNetLink .Attrs ().Index ,
515
+ Table : customDSRRouteTableID ,
516
+ }
517
+ routes , err := netlink .RouteListFiltered (nFamily , nRoute , netlink .RT_FILTER_TABLE | netlink .RT_FILTER_OIF )
518
+ if err != nil || len (routes ) < 1 {
519
+ err = netlink .RouteAdd (nRoute )
520
+ if err != nil {
521
+ return fmt .Errorf ("failed to add route to custom route table for DSR due to: %v" , err )
480
522
}
481
523
}
482
524
}
525
+
483
526
return nil
484
527
}
485
528
486
529
// For DSR it is required that node needs to know how to route external IP. Otherwise when endpoint
487
530
// directly responds back with source IP as external IP kernel will treat as martian packet.
488
531
// To prevent martian packets add route to external IP through the `kube-bridge` interface
489
532
// setupRoutesForExternalIPForDSR: setups routing so that kernel does not think return packets as martians
490
-
491
533
func (ln * linuxNetworking ) setupRoutesForExternalIPForDSR (serviceInfoMap serviceInfoMap ,
492
534
setupIPv4 , setupIPv6 bool ) error {
493
535
err := utils .RouteTableAdd (externalIPRouteTableID , externalIPRouteTableName )
494
536
if err != nil {
495
537
return fmt .Errorf ("failed to setup policy routing required for DSR due to %v" , err )
496
538
}
497
539
498
- setupIPRulesAndRoutes := func (ipArgs []string ) error {
499
- out , err := runIPCommandsWithArgs (ipArgs , "rule" , "list" ).Output ()
540
+ setupIPRulesAndRoutes := func (isIPv6 bool ) error {
541
+ nFamily := netlink .FAMILY_V4
542
+ _ , defaultPrefixCIDR , err := net .ParseCIDR (ipv4DefaultRoute )
543
+ if isIPv6 {
544
+ nFamily = netlink .FAMILY_V6
545
+ _ , defaultPrefixCIDR , err = net .ParseCIDR (ipv6DefaultRoute )
546
+ }
547
+ if err != nil {
548
+ return fmt .Errorf ("failed to parse default route (this is statically defined, so if you see this " +
549
+ "error please report because something has gone very wrong) due to: %v" , err )
550
+ }
551
+
552
+ nRule := & netlink.Rule {
553
+ Priority : defaultDSRPolicyRulePriority ,
554
+ Src : defaultPrefixCIDR ,
555
+ Table : externalIPRouteTableID ,
556
+ }
557
+ rules , err := netlink .RuleListFiltered (nFamily , nRule ,
558
+ netlink .RT_FILTER_TABLE | netlink .RT_FILTER_SRC | netlink .RT_FILTER_PRIORITY )
500
559
if err != nil {
501
- return fmt .Errorf ("failed to verify if `ip rule add prio 32765 from all lookup external_ip` exists due to: %v" ,
502
- err )
560
+ return fmt .Errorf ("failed to list rule for external IP's and verify if `ip rule add prio 32765 from all " +
561
+ "lookup external_ip` exists due to: %v" , err )
503
562
}
504
563
505
- if ! (strings .Contains (string (out ), externalIPRouteTableName ) ||
506
- strings .Contains (string (out ), externalIPRouteTableID )) {
507
- err = runIPCommandsWithArgs (ipArgs , "rule" , "add" , "prio" , "32765" , "from" , "all" , "lookup" ,
508
- externalIPRouteTableID ).Run ()
564
+ if len (rules ) < 1 {
565
+ err = netlink .RuleAdd (nRule )
509
566
if err != nil {
510
567
klog .Infof ("Failed to add policy rule `ip rule add prio 32765 from all lookup external_ip` due to %v" ,
511
- err . Error () )
568
+ err )
512
569
return fmt .Errorf ("failed to add policy rule `ip rule add prio 32765 from all lookup external_ip` " +
513
570
"due to %v" , err )
514
571
}
515
572
}
516
573
517
- out , _ = runIPCommandsWithArgs (ipArgs , "route" , "list" , "table" , externalIPRouteTableID ).Output ()
518
- outStr := string (out )
574
+ kubeBridgeLink , err := netlink .LinkByName (KubeBridgeIf )
575
+ if err != nil {
576
+ return fmt .Errorf ("failed to get kube-bridge interface due to %v" , err )
577
+ }
578
+
519
579
activeExternalIPs := make (map [string ]bool )
520
580
for _ , svc := range serviceInfoMap {
521
581
for _ , externalIP := range svc .externalIPs {
@@ -528,9 +588,21 @@ func (ln *linuxNetworking) setupRoutesForExternalIPForDSR(serviceInfoMap service
528
588
529
589
activeExternalIPs [externalIP ] = true
530
590
531
- if ! strings .Contains (outStr , externalIP ) {
532
- if err = runIPCommandsWithArgs (ipArgs , "route" , "add" , externalIP , "dev" , "kube-bridge" , "table" ,
533
- externalIPRouteTableID ).Run (); err != nil {
591
+ nSrcIP := net .ParseIP (externalIP )
592
+ nRoute := & netlink.Route {
593
+ Src : nSrcIP ,
594
+ LinkIndex : kubeBridgeLink .Attrs ().Index ,
595
+ Table : externalIPRouteTableID ,
596
+ }
597
+
598
+ routes , err := netlink .RouteListFiltered (nFamily , nRoute ,
599
+ netlink .RT_FILTER_SRC | netlink .RT_FILTER_TABLE | netlink .RT_FILTER_OIF )
600
+ if err != nil {
601
+ return fmt .Errorf ("failed to list route for external IP's due to: %s" , err )
602
+ }
603
+ if len (routes ) < 1 {
604
+ err = netlink .RouteAdd (nRoute )
605
+ if err != nil {
534
606
klog .Errorf ("Failed to add route for %s in custom route table for external IP's due to: %v" ,
535
607
externalIP , err )
536
608
continue
@@ -540,19 +612,18 @@ func (ln *linuxNetworking) setupRoutesForExternalIPForDSR(serviceInfoMap service
540
612
}
541
613
542
614
// check if there are any pbr in externalIPRouteTableID for external IP's
543
- if len (outStr ) > 0 {
544
- // clean up stale external IPs
545
- for _ , line := range strings .Split (strings .Trim (outStr , "\n " ), "\n " ) {
546
- route := strings .Split (strings .Trim (line , " " ), " " )
547
- ip := route [0 ]
548
- if ! activeExternalIPs [ip ] {
549
- args := []string {"route" , "del" , "table" , externalIPRouteTableID }
550
- args = append (args , route ... )
551
- if err = runIPCommandsWithArgs (ipArgs , args ... ).Run (); err != nil {
552
- klog .Errorf ("Failed to del route for %v in custom route table for external IP's due to: %s" ,
553
- ip , err )
554
- continue
555
- }
615
+ routes , err := netlink .RouteList (nil , nFamily )
616
+ if err != nil {
617
+ return fmt .Errorf ("failed to list route for external IP's due to: %s" , err )
618
+ }
619
+ for idx , route := range routes {
620
+ ip := route .Src .String ()
621
+ if ! activeExternalIPs [ip ] {
622
+ err = netlink .RouteDel (& routes [idx ])
623
+ if err != nil {
624
+ klog .Errorf ("Failed to del route for %v in custom route table for external IP's due to: %s" ,
625
+ ip , err )
626
+ continue
556
627
}
557
628
}
558
629
}
@@ -561,13 +632,13 @@ func (ln *linuxNetworking) setupRoutesForExternalIPForDSR(serviceInfoMap service
561
632
}
562
633
563
634
if setupIPv4 {
564
- err = setupIPRulesAndRoutes ([] string {} )
635
+ err = setupIPRulesAndRoutes (false )
565
636
if err != nil {
566
637
return err
567
638
}
568
639
}
569
640
if setupIPv6 {
570
- err = setupIPRulesAndRoutes ([] string { "-6" } )
641
+ err = setupIPRulesAndRoutes (true )
571
642
if err != nil {
572
643
return err
573
644
}
0 commit comments