Skip to content

Commit b1bc3b2

Browse files
committed
support ip-ip policy in EPG.
Signed-off-by: Ranjith <[email protected]>
1 parent e48a518 commit b1bc3b2

File tree

5 files changed

+117
-7
lines changed

5 files changed

+117
-7
lines changed

netctl/netctl.go

+4-6
Original file line numberDiff line numberDiff line change
@@ -227,9 +227,6 @@ func addRule(ctx *cli.Context) {
227227
if ctx.String("to-network") != "" {
228228
errExit(ctx, exitHelp, "Cant specify to-network for incoming rule", false)
229229
}
230-
if ctx.String("to-ip-address") != "" {
231-
errExit(ctx, exitHelp, "Cant specify to-ip-address for incoming rule", false)
232-
}
233230

234231
// If from EPG is specified, make sure from network is specified too
235232
if ctx.String("from-group") != "" && ctx.String("from-network") != "" {
@@ -340,18 +337,19 @@ func listRules(ctx *cli.Context) {
340337
writer := tabwriter.NewWriter(os.Stdout, 0, 2, 2, ' ', 0)
341338
defer writer.Flush()
342339
writer.Write([]byte("Incoming Rules:\n"))
343-
writer.Write([]byte("Rule\tPriority\tFrom EndpointGroup\tFrom Network\tFrom IpAddress\tProtocol\tPort\tAction\n"))
344-
writer.Write([]byte("----\t--------\t------------------\t------------\t---------\t--------\t----\t------\n"))
340+
writer.Write([]byte("Rule\tPriority\tFrom EndpointGroup\tFrom Network\tFrom IpAddress\tTo IpAddress\tProtocol\tPort\tAction\n"))
341+
writer.Write([]byte("----\t--------\t------------------\t------------\t---------\t------------\t--------\t----\t------\n"))
345342

346343
for _, rule := range results {
347344
if rule.Direction == "in" {
348345
writer.Write([]byte(fmt.Sprintf(
349-
"%v\t%v\t%v\t%v\t%v\t%v\t%v\t%v\n",
346+
"%v\t%v\t%v\t%v\t%v\t%v\t%v\t%v\t%v\n",
350347
rule.RuleID,
351348
rule.Priority,
352349
rule.FromEndpointGroup,
353350
rule.FromNetwork,
354351
rule.FromIpAddress,
352+
rule.ToIpAddress,
355353
rule.Protocol,
356354
rule.Port,
357355
rule.Action,

netmaster/mastercfg/policyState.go

+6
Original file line numberDiff line numberDiff line change
@@ -239,6 +239,9 @@ func (gp *EpgPolicy) createOfnetRule(rule *contivModel.Rule, dir string) (*ofnet
239239

240240
// Set src/dest IP Address
241241
ofnetRule.SrcIpAddr = rule.FromIpAddress
242+
if len(rule.ToIpAddress) > 0 {
243+
ofnetRule.DstIpAddr = rule.ToIpAddress
244+
}
242245

243246
// set port numbers
244247
ofnetRule.DstPort = uint16(rule.Port)
@@ -254,6 +257,9 @@ func (gp *EpgPolicy) createOfnetRule(rule *contivModel.Rule, dir string) (*ofnet
254257

255258
// Set src/dest IP Address
256259
ofnetRule.DstIpAddr = rule.FromIpAddress
260+
if len(rule.ToIpAddress) > 0 {
261+
ofnetRule.SrcIpAddr = rule.ToIpAddress
262+
}
257263

258264
// set port numbers
259265
ofnetRule.SrcPort = uint16(rule.Port)

netmaster/objApi/apiController.go

+50-1
Original file line numberDiff line numberDiff line change
@@ -1502,7 +1502,7 @@ func (ac *APIController) RuleCreate(rule *contivModel.Rule) error {
15021502

15031503
// verify parameter values
15041504
if rule.Direction == "in" {
1505-
if rule.ToNetwork != "" || rule.ToEndpointGroup != "" || rule.ToIpAddress != "" {
1505+
if rule.ToNetwork != "" || rule.ToEndpointGroup != "" {
15061506
return errors.New("can not specify 'to' parameters in incoming rule")
15071507
}
15081508
if rule.FromNetwork != "" && rule.FromIpAddress != "" {
@@ -1571,6 +1571,55 @@ func (ac *APIController) RuleCreate(rule *contivModel.Rule) error {
15711571
return core.Errorf("Policy not found")
15721572
}
15731573

1574+
if rule.Direction == "in" && rule.ToIpAddress != "" {
1575+
// rules from k8s network policy
1576+
// verify 'toIpAddress' is part of epg and subnet
1577+
if len(policy.LinkSets.EndpointGroups) != 1 {
1578+
errMsg := fmt.Errorf("failed to configure %s, %d endpoint groups linked to policy %s ",
1579+
rule.ToIpAddress,
1580+
len(policy.LinkSets.EndpointGroups),
1581+
rule.PolicyName)
1582+
log.Error(errMsg)
1583+
return errMsg
1584+
}
1585+
epgKey := ""
1586+
for key := range policy.LinkSets.EndpointGroups {
1587+
epgKey = strings.Replace(key, rule.TenantName+":", "", 1) + ":" + rule.TenantName
1588+
}
1589+
1590+
stateDriver, err := utils.GetStateDriver()
1591+
if err != nil {
1592+
log.Errorf("failed to configure %s, %s", rule.ToIpAddress, err)
1593+
return fmt.Errorf("failed to configure %s, unable to connect to key-value store",
1594+
rule.ToIpAddress)
1595+
}
1596+
readEp := &mastercfg.CfgEndpointState{}
1597+
readEp.StateDriver = stateDriver
1598+
epCfgs, err := readEp.ReadAll()
1599+
if err != nil {
1600+
log.Errorf("failed to configure %s, %s", rule.ToIpAddress, err)
1601+
return fmt.Errorf("failed to configure %s, unable to read endpoint state", rule.ToIpAddress)
1602+
}
1603+
1604+
// TODO: cache ip <--> epg for performance
1605+
if func(epgName string) bool {
1606+
for _, epCfg := range epCfgs {
1607+
if ep, ok := epCfg.(*mastercfg.CfgEndpointState); ok {
1608+
if ep.IPAddress == rule.ToIpAddress && ep.EndpointGroupKey == epgName {
1609+
return true
1610+
}
1611+
}
1612+
}
1613+
return false
1614+
}(epgKey) != true {
1615+
errMsg := fmt.Errorf("failed to configure %s, ip address is not in epg %s",
1616+
rule.ToIpAddress,
1617+
epgKey)
1618+
log.Error(errMsg)
1619+
return errMsg
1620+
}
1621+
}
1622+
15741623
// Trigger policyDB Update
15751624
err := master.PolicyAddRule(policy, rule)
15761625
if err != nil {

netmaster/objApi/objapi_test.go

+38
Original file line numberDiff line numberDiff line change
@@ -1418,8 +1418,12 @@ func TestNetworkPktRanges(t *testing.T) {
14181418

14191419
// TestPolicyRules tests policy and rule REST objects
14201420
func TestPolicyRules(t *testing.T) {
1421+
containerID1 := "723e55bf5b244f47c1b184cb786a1c2ad8870cc3a3db723c49ac09f68a9d1e69"
1422+
ep1 := "657355bf5b244f47c1b184cb786a14535d8870cc3a3db723c49ac09f68a9d6a5"
14211423
checkCreateNetwork(t, false, "default", "contiv", "data", "vxlan", "10.1.1.1/16", "10.1.1.254", 1, "", "", "")
14221424
checkCreateEpg(t, false, "default", "contiv", "group1", []string{}, []string{}, "")
1425+
createEPinEPG(t, "10.1.1.15", "default", "group1", containerID1, "default", ep1, []string{})
1426+
14231427
// create policy
14241428
checkCreatePolicy(t, false, "default", "policy1")
14251429

@@ -1435,6 +1439,14 @@ func TestPolicyRules(t *testing.T) {
14351439
checkCreateRule(t, false, "default", "policy1", "6", "in", "", "group1", "", "", "", "", "", "deny", 1, 0)
14361440
checkCreateRule(t, false, "default", "policy1", "7", "out", "", "", "", "", "group1", "", "tcp", "allow", 1, 80)
14371441

1442+
// verify --to-ip, no linked epg fails
1443+
checkCreateRule(t, true, "default", "policy1", "to-ip", "in", "", "", "10.1.1.15", "", "", "10.2.1.31", "tcp", "allow", 1, 80)
1444+
// verify --to-ip not in epg fails
1445+
checkCreateEpg(t, false, "default", "contiv", "group1", []string{"policy1"}, []string{}, "")
1446+
checkCreateRule(t, true, "default", "policy1", "to-ip", "in", "", "", "10.2.1.115", "", "", "10.1.1.19", "tcp", "allow", 1, 80)
1447+
checkCreateRule(t, false, "default", "policy1", "to-ip", "in", "", "", "10.2.1.11", "", "", "10.1.1.15", "tcp", "allow", 1, 80)
1448+
checkCreateEpg(t, false, "default", "contiv", "group1", []string{}, []string{}, "")
1449+
14381450
// verify duplicate rule id fails
14391451
checkCreateRule(t, true, "default", "policy1", "1", "in", "", "", "", "", "", "", "tcp", "allow", 1, 80)
14401452

@@ -1479,6 +1491,7 @@ func TestPolicyRules(t *testing.T) {
14791491
// checkCreateRule(t, true, tenant, policy, ruleID, dir, fnet, fepg, fip, tnet, tepg, tip, proto, prio, port)
14801492

14811493
// delete rules
1494+
checkDeleteRule(t, false, "default", "policy1", "to-ip")
14821495
checkDeleteRule(t, false, "default", "policy1", "1")
14831496
checkDeleteRule(t, false, "default", "policy1", "2")
14841497
checkDeleteRule(t, false, "default", "policy1", "3")
@@ -1493,6 +1506,8 @@ func TestPolicyRules(t *testing.T) {
14931506

14941507
// delete policy
14951508
checkDeletePolicy(t, false, "default", "policy1")
1509+
1510+
deleteEP(t, "default", "default", ep1)
14961511
// delete the EPG
14971512
checkDeleteEpg(t, false, "default", "contiv", "group1")
14981513
// delete the network
@@ -2245,6 +2260,29 @@ func get(getAll bool, hook func(id string) ([]core.State, error)) func(http.Resp
22452260
}
22462261
}
22472262

2263+
func createEPinEPG(t *testing.T, providerIP, network, epg, containerID, tenant, endpointID string, labels []string) {
2264+
2265+
epCfg := &mastercfg.CfgEndpointState{
2266+
NetID: network,
2267+
EndpointID: endpointID,
2268+
IPAddress: providerIP,
2269+
EndpointGroupKey: epg + ":" + tenant,
2270+
}
2271+
epCfg.Labels = make(map[string]string)
2272+
for _, v := range labels {
2273+
key := strings.Split(v, "=")[0]
2274+
value := strings.Split(v, "=")[1]
2275+
epCfg.Labels[key] = value
2276+
}
2277+
epCfg.StateDriver = stateStore
2278+
netID := network + "." + tenant
2279+
epCfg.ID = netID + "-" + endpointID
2280+
err := epCfg.Write()
2281+
if err != nil {
2282+
t.Errorf("Error creating Ep :%s", err)
2283+
}
2284+
}
2285+
22482286
func createEP(t *testing.T, providerIP, network, containerID, tenant, endpointID string, labels []string) {
22492287

22502288
epCfg := &mastercfg.CfgEndpointState{

utils/netutils/netutils_test.go

+19
Original file line numberDiff line numberDiff line change
@@ -523,3 +523,22 @@ func TestClearIPAddrRange(t *testing.T) {
523523
}
524524

525525
}
526+
527+
func TestIsOverlappingSubnet(t *testing.T) {
528+
testAddrRange := []struct {
529+
src string
530+
match string
531+
overlap bool
532+
}{
533+
{src: "10.36.0.1/32", match: "10.36.0.0/24", overlap: true},
534+
{src: "20.20.0.20/32", match: "20.20.0.0/16", overlap: true},
535+
{src: "20.20.5.20/32", match: "20.20.0.0/24", overlap: false},
536+
}
537+
538+
for _, i := range testAddrRange {
539+
540+
overlap := IsOverlappingSubnet(i.src, i.match)
541+
assertOnTrue(t, overlap != i.overlap, fmt.Sprintf("%+v got %v ", i, overlap))
542+
}
543+
544+
}

0 commit comments

Comments
 (0)