mirror of
https://github.com/k3s-io/k3s.git
synced 2024-06-07 19:41:36 +00:00
Merge pull request #4267 from manuelbuil/1.21-flannel-update
[Release-1.21] Update to the newest flannel
This commit is contained in:
commit
944ea312be
3
go.mod
3
go.mod
@ -68,7 +68,6 @@ replace (
|
||||
)
|
||||
|
||||
require (
|
||||
github.com/bronze1man/goStrongswanVici v0.0.0-20190828090544-27d02f80ba40 // indirect
|
||||
github.com/containerd/cgroups v1.0.1
|
||||
github.com/containerd/containerd v1.5.1
|
||||
github.com/containerd/cri v1.11.1-0.20200820101445-b0cc07999aa5
|
||||
@ -79,7 +78,7 @@ require (
|
||||
github.com/coreos/go-systemd v0.0.0-20190719114852-fd7a80b32e1f
|
||||
github.com/docker/docker v20.10.5+incompatible
|
||||
github.com/erikdubbelboer/gspt v0.0.0-20190125194910-e68493906b83
|
||||
github.com/flannel-io/flannel v0.14.0
|
||||
github.com/flannel-io/flannel v0.15.1
|
||||
github.com/go-bindata/go-bindata v3.1.2+incompatible
|
||||
github.com/go-sql-driver/mysql v1.4.1
|
||||
github.com/golangplus/testing v1.0.0 // indirect
|
||||
|
9
go.sum
9
go.sum
@ -116,9 +116,8 @@ github.com/blang/semver v3.5.0+incompatible/go.mod h1:kRBLl5iJ+tD4TcOOxsy/0fnweb
|
||||
github.com/blang/semver v3.5.1+incompatible h1:cQNTCjp13qL8KC3Nbxr/y2Bqb63oX6wdnnjpJbkM4JQ=
|
||||
github.com/blang/semver v3.5.1+incompatible/go.mod h1:kRBLl5iJ+tD4TcOOxsy/0fnwebNt5EWlYSAyrTnjyyk=
|
||||
github.com/boltdb/bolt v1.3.1/go.mod h1:clJnj/oiGkjum5o1McbSZDSLxVThjynRyGBgiAx27Ps=
|
||||
github.com/bronze1man/goStrongswanVici v0.0.0-20171013065002-4d72634a2f11/go.mod h1:c+n7HXa5FxzR8GDsmu773UtbtrmKvMVerLVQeEbnzAE=
|
||||
github.com/bronze1man/goStrongswanVici v0.0.0-20190828090544-27d02f80ba40 h1:udTfdeYqe866Z5mxTaEm5irSJK2vupyxwBOHAYEVtJo=
|
||||
github.com/bronze1man/goStrongswanVici v0.0.0-20190828090544-27d02f80ba40/go.mod h1:fWUtBEPt2yjrr3WFhOqvajM8JSEU8bEeBcoeSCsKRpc=
|
||||
github.com/bronze1man/goStrongswanVici v0.0.0-20201105010758-936f38b697fd h1:qn6a8rGrW+7p4ghypmYHZUKewXURuUDYxKqZxEoFjPc=
|
||||
github.com/bronze1man/goStrongswanVici v0.0.0-20201105010758-936f38b697fd/go.mod h1:fWUtBEPt2yjrr3WFhOqvajM8JSEU8bEeBcoeSCsKRpc=
|
||||
github.com/buger/jsonparser v0.0.0-20180808090653-f4dd9f5a6b44/go.mod h1:bbYlZJ7hK1yFx9hf58LP0zeX7UjIGs20ufpu3evjr+s=
|
||||
github.com/caddyserver/caddy v1.0.3/go.mod h1:G+ouvOY32gENkJC+jhgl62TyhvqEsFaDiZ4uw0RzP1E=
|
||||
github.com/canonical/go-dqlite v1.5.1 h1:1YjtIrFsC1A3XlgsX38ARAiKhvkZS63PqsEd8z3T4yU=
|
||||
@ -264,8 +263,8 @@ github.com/fatih/camelcase v1.0.0 h1:hxNvNX/xYBp0ovncs8WyWZrOrpBNub/JfaMvbURyft8
|
||||
github.com/fatih/camelcase v1.0.0/go.mod h1:yN2Sb0lFhZJUdVvtELVWefmrXpuZESvPmqwoZc+/fpc=
|
||||
github.com/fatih/color v1.7.0/go.mod h1:Zm6kSWBoL9eyXnKyktHP6abPY2pDugNf5KwzbycvMj4=
|
||||
github.com/fatih/color v1.9.0/go.mod h1:eQcE1qtQxscV5RaZvpXrrb8Drkc3/DdQ+uUYCNjL+zU=
|
||||
github.com/flannel-io/flannel v0.14.0 h1:7RmZN6G0L/mJwdzsLrAjfQKtKokfD1NcncPEfSqr+ac=
|
||||
github.com/flannel-io/flannel v0.14.0/go.mod h1:qZhrC3nxQudgshBtTb5rBqFxeYtQGRa4AQGwKi4u4Ds=
|
||||
github.com/flannel-io/flannel v0.15.1 h1:9v5/fapXePDnXVsFBVnji4IeLoXcO81bO8nEbQioYVQ=
|
||||
github.com/flannel-io/flannel v0.15.1/go.mod h1:fIcQpjXVBEE22oxqfZN0cXN0ZInsMDqTF5YoeGo6DgY=
|
||||
github.com/flynn/go-shlex v0.0.0-20150515145356-3f9db97f8568/go.mod h1:xEzjJPgXI435gkrCt3MPfRiAkVrwSbHsst4LCFVfpJc=
|
||||
github.com/fogleman/gg v1.2.1-0.20190220221249-0403632d5b90/go.mod h1:R/bRT+9gY/C5z7JzPU0zXsXHKM4/ayA+zqcVNZzPa1k=
|
||||
github.com/form3tech-oss/jwt-go v3.2.2+incompatible h1:TcekIExNqud5crz4xD2pavyTgWiPvpYe4Xau31I0PRk=
|
||||
|
@ -633,6 +633,7 @@ ip link show 2>/dev/null | grep 'master cni0' | while read ignore iface ignore;
|
||||
done
|
||||
ip link delete cni0
|
||||
ip link delete flannel.1
|
||||
ip link delete flannel-v6.1
|
||||
rm -rf /var/lib/cni/
|
||||
iptables-save | grep -v KUBE- | grep -v CNI- | iptables-restore
|
||||
EOF
|
||||
|
@ -39,13 +39,13 @@ const (
|
||||
subnetFile = "/run/flannel/subnet.env"
|
||||
)
|
||||
|
||||
func flannel(ctx context.Context, flannelIface *net.Interface, flannelConf, kubeConfigFile string) error {
|
||||
extIface, err := LookupExtInterface(flannelIface)
|
||||
func flannel(ctx context.Context, flannelIface *net.Interface, flannelConf, kubeConfigFile string, netMode int) error {
|
||||
extIface, err := LookupExtInterface(flannelIface, netMode)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
sm, err := kube.NewSubnetManager(ctx, "", kubeConfigFile, "flannel.alpha.coreos.com", flannelConf)
|
||||
sm, err := kube.NewSubnetManager(ctx, "", kubeConfigFile, "flannel.alpha.coreos.com", flannelConf, false)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
@ -71,7 +71,7 @@ func flannel(ctx context.Context, flannelIface *net.Interface, flannelConf, kube
|
||||
go network.SetupAndEnsureIPTables(network.MasqRules(config.Network, bn.Lease()), 60)
|
||||
go network.SetupAndEnsureIPTables(network.ForwardRules(config.Network.String()), 50)
|
||||
|
||||
if err := WriteSubnetFile(subnetFile, config.Network, true, bn); err != nil {
|
||||
if err := WriteSubnetFile(subnetFile, config.Network, config.IPv6Network, true, bn); err != nil {
|
||||
// Continue, even though it failed.
|
||||
log.Warningf("Failed to write subnet file: %s", err)
|
||||
} else {
|
||||
@ -84,8 +84,9 @@ func flannel(ctx context.Context, flannelIface *net.Interface, flannelConf, kube
|
||||
return nil
|
||||
}
|
||||
|
||||
func LookupExtInterface(iface *net.Interface) (*backend.ExternalInterface, error) {
|
||||
func LookupExtInterface(iface *net.Interface, netMode int) (*backend.ExternalInterface, error) {
|
||||
var ifaceAddr net.IP
|
||||
var ifacev6Addr net.IP
|
||||
var err error
|
||||
|
||||
if iface == nil {
|
||||
@ -102,20 +103,28 @@ func LookupExtInterface(iface *net.Interface) (*backend.ExternalInterface, error
|
||||
return nil, fmt.Errorf("failed to find IPv4 address for interface %s", iface.Name)
|
||||
}
|
||||
|
||||
log.Infof("Using interface with name %s and address %s", iface.Name, ifaceAddr)
|
||||
if netMode == (ipv4 + ipv6) {
|
||||
ifacev6Addr, err = ip.GetInterfaceIP6Addr(iface)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("failed to find IPv6 address for interface %s", iface.Name)
|
||||
}
|
||||
|
||||
log.Infof("Using ipv6 address %s", ifacev6Addr)
|
||||
}
|
||||
if iface.MTU == 0 {
|
||||
return nil, fmt.Errorf("failed to determine MTU for %s interface", ifaceAddr)
|
||||
}
|
||||
|
||||
return &backend.ExternalInterface{
|
||||
Iface: iface,
|
||||
IfaceAddr: ifaceAddr,
|
||||
ExtAddr: ifaceAddr,
|
||||
Iface: iface,
|
||||
IfaceAddr: ifaceAddr,
|
||||
IfaceV6Addr: ifacev6Addr,
|
||||
ExtAddr: ifaceAddr,
|
||||
ExtV6Addr: ifacev6Addr,
|
||||
}, nil
|
||||
}
|
||||
|
||||
func WriteSubnetFile(path string, nw ip.IP4Net, ipMasq bool, bn backend.Network) error {
|
||||
func WriteSubnetFile(path string, nw ip.IP4Net, nwv6 ip.IP6Net, ipMasq bool, bn backend.Network) error {
|
||||
dir, name := filepath.Split(path)
|
||||
os.MkdirAll(dir, 0755)
|
||||
|
||||
@ -132,6 +141,14 @@ func WriteSubnetFile(path string, nw ip.IP4Net, ipMasq bool, bn backend.Network)
|
||||
|
||||
fmt.Fprintf(f, "FLANNEL_NETWORK=%s\n", nw)
|
||||
fmt.Fprintf(f, "FLANNEL_SUBNET=%s\n", sn)
|
||||
|
||||
if nwv6.String() != emptyIPv6Network {
|
||||
snv6 := bn.Lease().IPv6Subnet
|
||||
snv6.IncrementIP()
|
||||
fmt.Fprintf(f, "FLANNEL_IPV6_NETWORK=%s\n", nwv6)
|
||||
fmt.Fprintf(f, "FLANNEL_IPV6_SUBNET=%s\n", snv6)
|
||||
}
|
||||
|
||||
fmt.Fprintf(f, "FLANNEL_MTU=%d\n", bn.MTU())
|
||||
_, err = fmt.Fprintf(f, "FLANNEL_IPMASQ=%v\n", ipMasq)
|
||||
f.Close()
|
||||
|
@ -2,7 +2,9 @@ package flannel
|
||||
|
||||
import (
|
||||
"context"
|
||||
"errors"
|
||||
"fmt"
|
||||
"net"
|
||||
"os"
|
||||
"path/filepath"
|
||||
"strings"
|
||||
@ -14,6 +16,7 @@ import (
|
||||
"github.com/sirupsen/logrus"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
v1 "k8s.io/client-go/kubernetes/typed/core/v1"
|
||||
utilsnet "k8s.io/utils/net"
|
||||
)
|
||||
|
||||
const (
|
||||
@ -41,6 +44,8 @@ const (
|
||||
|
||||
flannelConf = `{
|
||||
"Network": "%CIDR%",
|
||||
"EnableIPv6": %DUALSTACK%,
|
||||
"IPv6Network": "%CIDR_IPV6%",
|
||||
"Backend": %backend%
|
||||
}
|
||||
`
|
||||
@ -67,6 +72,11 @@ const (
|
||||
"SubnetAddCommand": "read PUBLICKEY; wg set flannel.1 peer $PUBLICKEY endpoint $PUBLIC_IP:51820 allowed-ips $SUBNET persistent-keepalive 25",
|
||||
"SubnetRemoveCommand": "read PUBLICKEY; wg set flannel.1 peer $PUBLICKEY remove"
|
||||
}`
|
||||
|
||||
emptyIPv6Network = "::/0"
|
||||
|
||||
ipv4 = iota
|
||||
ipv6
|
||||
)
|
||||
|
||||
func Prepare(ctx context.Context, nodeConfig *config.Node) error {
|
||||
@ -94,9 +104,16 @@ func Run(ctx context.Context, nodeConfig *config.Node, nodes v1.NodeInterface) e
|
||||
}
|
||||
logrus.Info("Node CIDR assigned for: " + nodeName)
|
||||
|
||||
netMode, err := findNetMode(nodeConfig.AgentConfig.ClusterCIDRs)
|
||||
if err != nil {
|
||||
logrus.Fatalf("Error checking netMode")
|
||||
return err
|
||||
}
|
||||
go func() {
|
||||
err := flannel(ctx, nodeConfig.FlannelIface, nodeConfig.FlannelConf, nodeConfig.AgentConfig.KubeConfigKubelet)
|
||||
logrus.Fatalf("flannel exited: %v", err)
|
||||
err := flannel(ctx, nodeConfig.FlannelIface, nodeConfig.FlannelConf, nodeConfig.AgentConfig.KubeConfigKubelet, netMode)
|
||||
if err != nil && !errors.Is(err, context.Canceled) {
|
||||
logrus.Fatalf("flannel exited: %v", err)
|
||||
}
|
||||
}()
|
||||
|
||||
return nil
|
||||
@ -139,6 +156,24 @@ func createFlannelConf(nodeConfig *config.Node) error {
|
||||
}
|
||||
confJSON = strings.Replace(confJSON, "%backend%", backendConf, -1)
|
||||
|
||||
netMode, err := findNetMode(nodeConfig.AgentConfig.ClusterCIDRs)
|
||||
if err != nil {
|
||||
logrus.Fatalf("Error checking netMode")
|
||||
return err
|
||||
}
|
||||
|
||||
if netMode == (ipv4 + ipv6) {
|
||||
confJSON = strings.ReplaceAll(confJSON, "%DUALSTACK%", "true")
|
||||
for _, cidr := range nodeConfig.AgentConfig.ClusterCIDRs {
|
||||
if utilsnet.IsIPv6(cidr.IP) {
|
||||
// Only one ipv6 range available. This might change in future: https://github.com/kubernetes/enhancements/issues/2593
|
||||
confJSON = strings.ReplaceAll(confJSON, "%CIDR_IPV6%", cidr.String())
|
||||
}
|
||||
}
|
||||
} else {
|
||||
confJSON = strings.ReplaceAll(confJSON, "%DUALSTACK%", "false")
|
||||
confJSON = strings.ReplaceAll(confJSON, "%CIDR_IPV6%", emptyIPv6Network)
|
||||
}
|
||||
return util.WriteFile(nodeConfig.FlannelConf, confJSON)
|
||||
}
|
||||
|
||||
@ -169,3 +204,24 @@ func setupStrongSwan(nodeConfig *config.Node) error {
|
||||
// make new strongswan link
|
||||
return os.Symlink(dataDir, nodeConfig.AgentConfig.StrongSwanDir)
|
||||
}
|
||||
|
||||
// fundNetMode returns the mode (ipv4, ipv6 or dual-stack) in which flannel is operating
|
||||
func findNetMode(cidrs []*net.IPNet) (int, error) {
|
||||
dualStack, err := utilsnet.IsDualStackCIDRs(cidrs)
|
||||
if err != nil {
|
||||
return 0, err
|
||||
}
|
||||
if dualStack {
|
||||
return ipv4 + ipv6, nil
|
||||
}
|
||||
|
||||
for _, cidr := range cidrs {
|
||||
if utilsnet.IsIPv4CIDR(cidr) {
|
||||
return ipv4, nil
|
||||
}
|
||||
if utilsnet.IsIPv6CIDR(cidr) {
|
||||
return ipv6, nil
|
||||
}
|
||||
}
|
||||
return 0, errors.New("Failed checking netMode")
|
||||
}
|
||||
|
64
vendor/github.com/bronze1man/goStrongswanVici/clientConn.go
generated
vendored
64
vendor/github.com/bronze1man/goStrongswanVici/clientConn.go
generated
vendored
@ -4,6 +4,7 @@ import (
|
||||
"fmt"
|
||||
"io"
|
||||
"net"
|
||||
"sync"
|
||||
"time"
|
||||
)
|
||||
|
||||
@ -22,11 +23,16 @@ type ClientConn struct {
|
||||
// ReadTimeout specifies a time limit for requests made
|
||||
// by this client.
|
||||
ReadTimeout time.Duration
|
||||
|
||||
lock sync.RWMutex
|
||||
}
|
||||
|
||||
func (c *ClientConn) Close() error {
|
||||
c.lock.Lock()
|
||||
defer c.lock.Unlock()
|
||||
close(c.responseChan)
|
||||
c.lastError = io.ErrClosedPipe
|
||||
|
||||
return c.conn.Close()
|
||||
}
|
||||
|
||||
@ -38,6 +44,7 @@ func NewClientConn(conn net.Conn) (client *ClientConn) {
|
||||
ReadTimeout: DefaultReadTimeout,
|
||||
}
|
||||
go client.readThread()
|
||||
|
||||
return client
|
||||
}
|
||||
|
||||
@ -47,6 +54,7 @@ func NewClientConnFromDefaultSocket() (client *ClientConn, err error) {
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
|
||||
return NewClientConn(conn), nil
|
||||
}
|
||||
|
||||
@ -58,16 +66,23 @@ func (c *ClientConn) Request(apiname string, request map[string]interface{}) (re
|
||||
})
|
||||
if err != nil {
|
||||
fmt.Printf("error writing segment \n")
|
||||
|
||||
return
|
||||
}
|
||||
|
||||
outMsg := c.readResponse()
|
||||
if c.lastError != nil {
|
||||
return nil, c.lastError
|
||||
c.lock.RLock()
|
||||
err = c.lastError
|
||||
if err != nil {
|
||||
c.lock.RUnlock()
|
||||
return nil, err
|
||||
}
|
||||
c.lock.RUnlock()
|
||||
|
||||
if outMsg.typ != stCMD_RESPONSE {
|
||||
return nil, fmt.Errorf("[%s] response error %d", apiname, outMsg.typ)
|
||||
}
|
||||
|
||||
return outMsg.msg, nil
|
||||
}
|
||||
|
||||
@ -77,16 +92,22 @@ func (c *ClientConn) readResponse() segment {
|
||||
return outMsg
|
||||
case <-time.After(c.ReadTimeout):
|
||||
if c.lastError == nil {
|
||||
c.lock.Lock()
|
||||
c.lastError = fmt.Errorf("Timeout waiting for message response")
|
||||
c.lock.Unlock()
|
||||
}
|
||||
|
||||
return segment{}
|
||||
}
|
||||
}
|
||||
|
||||
func (c *ClientConn) RegisterEvent(name string, handler func(response map[string]interface{})) (err error) {
|
||||
c.lock.Lock()
|
||||
if c.eventHandlers[name] != nil {
|
||||
c.lock.Unlock()
|
||||
return fmt.Errorf("[event %s] register a event twice.", name)
|
||||
}
|
||||
|
||||
c.eventHandlers[name] = handler
|
||||
err = writeSegment(c.conn, segment{
|
||||
typ: stEVENT_REGISTER,
|
||||
@ -94,19 +115,31 @@ func (c *ClientConn) RegisterEvent(name string, handler func(response map[string
|
||||
})
|
||||
if err != nil {
|
||||
delete(c.eventHandlers, name)
|
||||
c.lock.Unlock()
|
||||
|
||||
return
|
||||
}
|
||||
c.lock.Unlock()
|
||||
outMsg := c.readResponse()
|
||||
//fmt.Printf("registerEvent %#v\n", outMsg)
|
||||
if c.lastError != nil {
|
||||
// fmt.Printf("registerEvent %#v\n", outMsg)
|
||||
c.lock.Lock()
|
||||
lastError := c.lastError
|
||||
|
||||
if lastError != nil {
|
||||
delete(c.eventHandlers, name)
|
||||
return c.lastError
|
||||
c.lock.Unlock()
|
||||
|
||||
return err
|
||||
}
|
||||
|
||||
if outMsg.typ != stEVENT_CONFIRM {
|
||||
delete(c.eventHandlers, name)
|
||||
c.lock.Unlock()
|
||||
|
||||
return fmt.Errorf("[event %s] response error %d", name, outMsg.typ)
|
||||
}
|
||||
c.lock.Unlock()
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
@ -118,16 +151,25 @@ func (c *ClientConn) UnregisterEvent(name string) (err error) {
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
|
||||
outMsg := c.readResponse()
|
||||
//fmt.Printf("UnregisterEvent %#v\n", outMsg)
|
||||
// fmt.Printf("UnregisterEvent %#v\n", outMsg)
|
||||
c.lock.Lock()
|
||||
if c.lastError != nil {
|
||||
c.lock.Unlock()
|
||||
|
||||
return c.lastError
|
||||
}
|
||||
c.lock.Unlock()
|
||||
|
||||
if outMsg.typ != stEVENT_CONFIRM {
|
||||
return fmt.Errorf("[event %s] response error %d", name, outMsg.typ)
|
||||
}
|
||||
|
||||
c.lock.Lock()
|
||||
delete(c.eventHandlers, name)
|
||||
c.lock.Unlock()
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
@ -135,19 +177,29 @@ func (c *ClientConn) readThread() {
|
||||
for {
|
||||
outMsg, err := readSegment(c.conn)
|
||||
if err != nil {
|
||||
c.lock.Lock()
|
||||
c.lastError = err
|
||||
c.lock.Unlock()
|
||||
|
||||
return
|
||||
}
|
||||
|
||||
switch outMsg.typ {
|
||||
case stCMD_RESPONSE, stEVENT_CONFIRM:
|
||||
c.responseChan <- outMsg
|
||||
case stEVENT:
|
||||
c.lock.Lock()
|
||||
handler := c.eventHandlers[outMsg.name]
|
||||
c.lock.Unlock()
|
||||
|
||||
if handler != nil {
|
||||
handler(outMsg.msg)
|
||||
}
|
||||
default:
|
||||
c.lock.Lock()
|
||||
c.lastError = fmt.Errorf("[Client.readThread] unknow msg type %d", outMsg.typ)
|
||||
c.lock.Unlock()
|
||||
|
||||
return
|
||||
}
|
||||
}
|
||||
|
2
vendor/github.com/bronze1man/goStrongswanVici/loadCert.go
generated
vendored
2
vendor/github.com/bronze1man/goStrongswanVici/loadCert.go
generated
vendored
@ -30,7 +30,7 @@ func (c *ClientConn) LoadCertificate(s string, typ string, flag string) (err err
|
||||
}
|
||||
|
||||
if msg["success"] != "yes" {
|
||||
return fmt.Errorf("unsuccessful loadCert: %v", msg["success"])
|
||||
return fmt.Errorf("unsuccessful loadCert: %v", msg["errmsg"])
|
||||
}
|
||||
|
||||
return nil
|
||||
|
38
vendor/github.com/bronze1man/goStrongswanVici/loadConn.go
generated
vendored
38
vendor/github.com/bronze1man/goStrongswanVici/loadConn.go
generated
vendored
@ -1,6 +1,9 @@
|
||||
package goStrongswanVici
|
||||
|
||||
import (
|
||||
"crypto"
|
||||
"crypto/x509"
|
||||
"encoding/pem"
|
||||
"fmt"
|
||||
)
|
||||
|
||||
@ -11,7 +14,10 @@ type Connection struct {
|
||||
type IKEConf struct {
|
||||
LocalAddrs []string `json:"local_addrs"`
|
||||
RemoteAddrs []string `json:"remote_addrs,omitempty"`
|
||||
LocalPort string `json:"local_port,omitempty"`
|
||||
RemotePort string `json:"remote_port,omitempty"`
|
||||
Proposals []string `json:"proposals,omitempty"`
|
||||
Vips []string `json:"vips,omitempty"`
|
||||
Version string `json:"version"` //1 for ikev1, 0 for ikev1 & ikev2
|
||||
Encap string `json:"encap"` //yes,no
|
||||
KeyingTries string `json:"keyingtries"`
|
||||
@ -21,13 +27,15 @@ type IKEConf struct {
|
||||
RemoteAuth AuthConf `json:"remote"`
|
||||
Pools []string `json:"pools,omitempty"`
|
||||
Children map[string]ChildSAConf `json:"children"`
|
||||
Mobike string `json:"mobike,omitempty"`
|
||||
}
|
||||
|
||||
type AuthConf struct {
|
||||
ID string `json:"id"`
|
||||
Round string `json:"round,omitempty"`
|
||||
AuthMethod string `json:"auth"` // (psk|pubkey)
|
||||
EAP_ID string `json:"eap_id,omitempty"`
|
||||
ID string `json:"id"`
|
||||
Round string `json:"round,omitempty"`
|
||||
AuthMethod string `json:"auth"` // (psk|pubkey)
|
||||
EAP_ID string `json:"eap_id,omitempty"`
|
||||
PubKeys []string `json:"pubkeys,omitempty"` // PEM encoded public keys
|
||||
}
|
||||
|
||||
type ChildSAConf struct {
|
||||
@ -49,6 +57,28 @@ type ChildSAConf struct {
|
||||
LifeTime string `json:"life_time,omitempty"`
|
||||
}
|
||||
|
||||
// SetPublicKeys is a helper method that converts Public Keys to x509 PKIX PEM format
|
||||
// Supported formats are those implemented by x509.MarshalPKIXPublicKey
|
||||
func (a *AuthConf) SetPublicKeys(keys []crypto.PublicKey) error {
|
||||
var newKeys []string
|
||||
|
||||
for _, key := range keys {
|
||||
asn1Bytes, err := x509.MarshalPKIXPublicKey(key)
|
||||
if err != nil {
|
||||
return fmt.Errorf("Error marshaling key: %v", err)
|
||||
}
|
||||
pemKey := pem.Block{
|
||||
Type: "PUBLIC KEY",
|
||||
Bytes: asn1Bytes,
|
||||
}
|
||||
pemBytes := pem.EncodeToMemory(&pemKey)
|
||||
newKeys = append(newKeys, string(pemBytes))
|
||||
}
|
||||
|
||||
a.PubKeys = newKeys
|
||||
return nil
|
||||
}
|
||||
|
||||
func (c *ClientConn) LoadConn(conn *map[string]IKEConf) error {
|
||||
requestMap := &map[string]interface{}{}
|
||||
|
||||
|
2
vendor/github.com/bronze1man/goStrongswanVici/loadPrivateKey.go
generated
vendored
2
vendor/github.com/bronze1man/goStrongswanVici/loadPrivateKey.go
generated
vendored
@ -59,7 +59,7 @@ func (c *ClientConn) loadPrivateKey(typ, data string) (err error) {
|
||||
|
||||
msg, err := c.Request("load-key", *requestMap)
|
||||
if msg["success"] != "yes" {
|
||||
return fmt.Errorf("unsuccessful loadPrivateKey: %v", msg["success"])
|
||||
return fmt.Errorf("unsuccessful loadPrivateKey: %v", msg["errmsg"])
|
||||
}
|
||||
|
||||
return nil
|
||||
|
50
vendor/github.com/bronze1man/goStrongswanVici/monitorSA.go
generated
vendored
50
vendor/github.com/bronze1man/goStrongswanVici/monitorSA.go
generated
vendored
@ -31,35 +31,38 @@ type EventIkeSAUpDown struct {
|
||||
Remote_id string `json:"remote-id"`
|
||||
Remote_host string `json:"remote-host"`
|
||||
Remote_port string `json:"remote-port"`
|
||||
Remote_vips []string `json:"remote-vips"`
|
||||
Responder_spi string `json:"responder-spi"`
|
||||
State string `json:"state"`
|
||||
Task_Active []string `json:"tasks-active"`
|
||||
Uniqueid string `json:"uniqueid"`
|
||||
Version string `json:"version"`
|
||||
Remote_eap_id string `json:"remote-eap-id"` // client user name
|
||||
}
|
||||
|
||||
type EventChildSAUpDown struct {
|
||||
Bytes_in string `json:"bytes-in"`
|
||||
Bytes_out string `json:"bytes-out"`
|
||||
Encap string `json:"encap"`
|
||||
Encr_alg string `json:"encr-alg"`
|
||||
Encr_keysize string `json:"encr-keysize"`
|
||||
Integ_alg string `json:"integ-alg"`
|
||||
Install_time string `json:"install-time"`
|
||||
Life_time string `json:"life-time"`
|
||||
Local_ts []string `json:"local-ts"`
|
||||
Mode string `json:"mode"`
|
||||
Name string `json:"name"`
|
||||
Protocol string `json:"protocol"`
|
||||
Packets_out string `json:"packets-out"`
|
||||
Packets_in string `json:"packets-in"`
|
||||
Rekey_time string `json:"rekey-time"`
|
||||
Remote_ts []string `json:"remote-ts"`
|
||||
Reqid string `json:"reqid"`
|
||||
Spi_in string `json:"spi-in"`
|
||||
Spi_out string `json:"spi-out"`
|
||||
State string `json:"state"`
|
||||
UniqueId string `json:"uniqueid"`
|
||||
Bytes_in string `json:"bytes-in"`
|
||||
Bytes_out string `json:"bytes-out"`
|
||||
Encap string `json:"encap"`
|
||||
Encr_alg string `json:"encr-alg"`
|
||||
Encr_keysize string `json:"encr-keysize"`
|
||||
Integ_alg string `json:"integ-alg"`
|
||||
Install_time string `json:"install-time"`
|
||||
Life_time string `json:"life-time"`
|
||||
Local_ts []string `json:"local-ts"`
|
||||
Mode string `json:"mode"`
|
||||
Name string `json:"name"`
|
||||
Protocol string `json:"protocol"`
|
||||
Packets_out string `json:"packets-out"`
|
||||
Packets_in string `json:"packets-in"`
|
||||
Rekey_time string `json:"rekey-time"`
|
||||
Remote_ts []string `json:"remote-ts"`
|
||||
Reqid string `json:"reqid"`
|
||||
Spi_in string `json:"spi-in"`
|
||||
Spi_out string `json:"spi-out"`
|
||||
State string `json:"state"`
|
||||
UniqueId string `json:"uniqueid"`
|
||||
Remote_eap_id string `json:"remote-eap-id"` // client user name
|
||||
}
|
||||
|
||||
type EventIkeRekeyPair struct {
|
||||
@ -85,12 +88,14 @@ type EventIkeRekeySA struct {
|
||||
Remote_id string `json:"remote-id"`
|
||||
Remote_host string `json:"remote-host"`
|
||||
Remote_port string `json:"remote-port"`
|
||||
Remote_vips []string `json:"remote-vips"`
|
||||
Responder_spi string `json:"responder-spi"`
|
||||
State string `json:"state"`
|
||||
Task_Active []string `json:"tasks-active"`
|
||||
Task_Passive []string `json:"tasks-passive"`
|
||||
Uniqueid string `json:"uniqueid"`
|
||||
Version string `json:"version"`
|
||||
Remote_eap_id string `json:"remote-eap-id"` // client user name
|
||||
}
|
||||
|
||||
type EventChildRekeyPair struct {
|
||||
@ -160,7 +165,6 @@ func prettyprint(b []byte) string {
|
||||
|
||||
type monitorCallBack func(event string, info interface{})
|
||||
|
||||
|
||||
func handleIkeUpDown(eventName string, callback monitorCallBack, response map[string]interface{}) {
|
||||
event := &EventIkeUpDown{}
|
||||
event.Ike = map[string]*EventIkeSAUpDown{}
|
||||
@ -221,7 +225,7 @@ func handleChildRekey(eventName string, callback monitorCallBack, response map[s
|
||||
callback(eventName, event)
|
||||
}
|
||||
|
||||
func (c *ClientConn) MonitorSA(callback monitorCallBack,watchdog time.Duration) (err error) {
|
||||
func (c *ClientConn) MonitorSA(callback monitorCallBack, watchdog time.Duration) (err error) {
|
||||
//register event
|
||||
c.RegisterEvent(EVENT_CHILD_UPDOWN, func(response map[string]interface{}) {
|
||||
//dumpResponse(response)
|
||||
|
2
vendor/github.com/bronze1man/goStrongswanVici/pools.go
generated
vendored
2
vendor/github.com/bronze1man/goStrongswanVici/pools.go
generated
vendored
@ -29,7 +29,7 @@ func (c *ClientConn) LoadPool(ph Pool) error {
|
||||
msg, err := c.Request("load-pool", requestMap)
|
||||
|
||||
if msg["success"] != "yes" {
|
||||
return fmt.Errorf("unsuccessful LoadPool: %v", msg["success"])
|
||||
return fmt.Errorf("unsuccessful LoadPool: %v", msg["errmsg"])
|
||||
}
|
||||
|
||||
return nil
|
||||
|
1
vendor/github.com/bronze1man/goStrongswanVici/terminate.go
generated
vendored
1
vendor/github.com/bronze1man/goStrongswanVici/terminate.go
generated
vendored
@ -9,6 +9,7 @@ type TerminateRequest struct {
|
||||
Ike string `json:"ike,omitempty"`
|
||||
Child_id string `json:"child-id,omitempty"`
|
||||
Ike_id string `json:"ike-id,omitempty"`
|
||||
Force string `json:"force,omitempty"`
|
||||
Timeout string `json:"timeout,omitempty"`
|
||||
Loglevel string `json:"loglevel,omitempty"`
|
||||
}
|
||||
|
11
vendor/github.com/flannel-io/flannel/backend/common.go
generated
vendored
11
vendor/github.com/flannel-io/flannel/backend/common.go
generated
vendored
@ -18,15 +18,16 @@ import (
|
||||
"net"
|
||||
"sync"
|
||||
|
||||
"golang.org/x/net/context"
|
||||
|
||||
"github.com/flannel-io/flannel/subnet"
|
||||
"golang.org/x/net/context"
|
||||
)
|
||||
|
||||
type ExternalInterface struct {
|
||||
Iface *net.Interface
|
||||
IfaceAddr net.IP
|
||||
ExtAddr net.IP
|
||||
Iface *net.Interface
|
||||
IfaceAddr net.IP
|
||||
IfaceV6Addr net.IP
|
||||
ExtAddr net.IP
|
||||
ExtV6Addr net.IP
|
||||
}
|
||||
|
||||
// Besides the entry points in the Backend interface, the backend's New()
|
||||
|
31
vendor/github.com/flannel-io/flannel/backend/hostgw/hostgw.go
generated
vendored
31
vendor/github.com/flannel-io/flannel/backend/hostgw/hostgw.go
generated
vendored
@ -19,7 +19,6 @@ package hostgw
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
|
||||
"sync"
|
||||
|
||||
"github.com/flannel-io/flannel/backend"
|
||||
@ -60,17 +59,31 @@ func (be *HostgwBackend) RegisterNetwork(ctx context.Context, wg *sync.WaitGroup
|
||||
Mtu: be.extIface.Iface.MTU,
|
||||
LinkIndex: be.extIface.Iface.Index,
|
||||
}
|
||||
n.GetRoute = func(lease *subnet.Lease) *netlink.Route {
|
||||
return &netlink.Route{
|
||||
Dst: lease.Subnet.ToIPNet(),
|
||||
Gw: lease.Attrs.PublicIP.ToIP(),
|
||||
LinkIndex: n.LinkIndex,
|
||||
|
||||
attrs := subnet.LeaseAttrs{
|
||||
BackendType: "host-gw",
|
||||
}
|
||||
|
||||
if config.EnableIPv4 {
|
||||
attrs.PublicIP = ip.FromIP(be.extIface.ExtAddr)
|
||||
n.GetRoute = func(lease *subnet.Lease) *netlink.Route {
|
||||
return &netlink.Route{
|
||||
Dst: lease.Subnet.ToIPNet(),
|
||||
Gw: lease.Attrs.PublicIP.ToIP(),
|
||||
LinkIndex: n.LinkIndex,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
attrs := subnet.LeaseAttrs{
|
||||
PublicIP: ip.FromIP(be.extIface.ExtAddr),
|
||||
BackendType: "host-gw",
|
||||
if config.EnableIPv6 {
|
||||
attrs.PublicIPv6 = ip.FromIP6(be.extIface.ExtV6Addr)
|
||||
n.GetV6Route = func(lease *subnet.Lease) *netlink.Route {
|
||||
return &netlink.Route{
|
||||
Dst: lease.IPv6Subnet.ToIPNet(),
|
||||
Gw: lease.Attrs.PublicIPv6.ToIP(),
|
||||
LinkIndex: n.LinkIndex,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
l, err := be.sm.AcquireLease(ctx, &attrs)
|
||||
|
17
vendor/github.com/flannel-io/flannel/backend/ipsec/handle_charon.go
generated
vendored
17
vendor/github.com/flannel-io/flannel/backend/ipsec/handle_charon.go
generated
vendored
@ -156,14 +156,15 @@ func (charon *CharonIKEDaemon) LoadConnection(localLease, remoteLease *subnet.Le
|
||||
|
||||
childConfMap := make(map[string]goStrongswanVici.ChildSAConf)
|
||||
childSAConf := goStrongswanVici.ChildSAConf{
|
||||
Local_ts: []string{localLease.Subnet.String()},
|
||||
Remote_ts: []string{remoteLease.Subnet.String()},
|
||||
ESPProposals: []string{charon.espProposal},
|
||||
StartAction: "start",
|
||||
CloseAction: "trap",
|
||||
Mode: "tunnel",
|
||||
ReqID: reqID,
|
||||
// RekeyTime: rekeyTime,
|
||||
Local_ts: []string{localLease.Subnet.String()},
|
||||
Remote_ts: []string{remoteLease.Subnet.String()},
|
||||
ESPProposals: []string{charon.espProposal},
|
||||
StartAction: "start",
|
||||
CloseAction: "trap",
|
||||
DpdAction: "restart",
|
||||
Mode: "tunnel",
|
||||
ReqID: reqID,
|
||||
RekeyTime: "1h",
|
||||
InstallPolicy: "no",
|
||||
}
|
||||
|
||||
|
6
vendor/github.com/flannel-io/flannel/backend/ipsec/ipsec_windows.go
generated
vendored
6
vendor/github.com/flannel-io/flannel/backend/ipsec/ipsec_windows.go
generated
vendored
@ -13,9 +13,3 @@
|
||||
// limitations under the License.
|
||||
|
||||
package ipsec
|
||||
|
||||
import log "k8s.io/klog"
|
||||
|
||||
func init() {
|
||||
log.Infof("ipsec is not supported on this platform")
|
||||
}
|
||||
|
3
vendor/github.com/flannel-io/flannel/backend/manager.go
generated
vendored
3
vendor/github.com/flannel-io/flannel/backend/manager.go
generated
vendored
@ -19,9 +19,8 @@ import (
|
||||
"strings"
|
||||
"sync"
|
||||
|
||||
"golang.org/x/net/context"
|
||||
|
||||
"github.com/flannel-io/flannel/subnet"
|
||||
"golang.org/x/net/context"
|
||||
)
|
||||
|
||||
var constructors = make(map[string]BackendCtor)
|
||||
|
153
vendor/github.com/flannel-io/flannel/backend/route_network.go
generated
vendored
153
vendor/github.com/flannel-io/flannel/backend/route_network.go
generated
vendored
@ -22,10 +22,9 @@ import (
|
||||
"sync"
|
||||
"time"
|
||||
|
||||
"golang.org/x/net/context"
|
||||
|
||||
"github.com/flannel-io/flannel/subnet"
|
||||
"github.com/vishvananda/netlink"
|
||||
"golang.org/x/net/context"
|
||||
log "k8s.io/klog"
|
||||
)
|
||||
|
||||
@ -37,8 +36,10 @@ type RouteNetwork struct {
|
||||
SimpleNetwork
|
||||
BackendType string
|
||||
routes []netlink.Route
|
||||
v6Routes []netlink.Route
|
||||
SM subnet.Manager
|
||||
GetRoute func(lease *subnet.Lease) *netlink.Route
|
||||
GetV6Route func(lease *subnet.Lease) *netlink.Route
|
||||
Mtu int
|
||||
LinkIndex int
|
||||
}
|
||||
@ -83,54 +84,53 @@ func (n *RouteNetwork) handleSubnetEvents(batch []subnet.Event) {
|
||||
for _, evt := range batch {
|
||||
switch evt.Type {
|
||||
case subnet.EventAdded:
|
||||
log.Infof("Subnet added: %v via %v", evt.Lease.Subnet, evt.Lease.Attrs.PublicIP)
|
||||
|
||||
if evt.Lease.Attrs.BackendType != n.BackendType {
|
||||
log.Warningf("Ignoring non-%v subnet: type=%v", n.BackendType, evt.Lease.Attrs.BackendType)
|
||||
continue
|
||||
}
|
||||
route := n.GetRoute(&evt.Lease)
|
||||
|
||||
n.addToRouteList(*route)
|
||||
// Check if route exists before attempting to add it
|
||||
routeList, err := netlink.RouteListFiltered(netlink.FAMILY_V4, &netlink.Route{Dst: route.Dst}, netlink.RT_FILTER_DST)
|
||||
if err != nil {
|
||||
log.Warningf("Unable to list routes: %v", err)
|
||||
if evt.Lease.EnableIPv4 {
|
||||
log.Infof("Subnet added: %v via %v", evt.Lease.Subnet, evt.Lease.Attrs.PublicIP)
|
||||
|
||||
route := n.GetRoute(&evt.Lease)
|
||||
routeAdd(route, netlink.FAMILY_V4, n.addToRouteList, n.removeFromV4RouteList)
|
||||
}
|
||||
|
||||
if len(routeList) > 0 && !routeEqual(routeList[0], *route) {
|
||||
// Same Dst different Gw or different link index. Remove it, correct route will be added below.
|
||||
log.Warningf("Replacing existing route to %v via %v dev index %d with %v via %v dev index %d.", evt.Lease.Subnet, routeList[0].Gw, routeList[0].LinkIndex, evt.Lease.Subnet, evt.Lease.Attrs.PublicIP, route.LinkIndex)
|
||||
if err := netlink.RouteDel(&routeList[0]); err != nil {
|
||||
log.Errorf("Error deleting route to %v: %v", evt.Lease.Subnet, err)
|
||||
continue
|
||||
}
|
||||
n.removeFromRouteList(routeList[0])
|
||||
}
|
||||
if evt.Lease.EnableIPv6 {
|
||||
log.Infof("Subnet added: %v via %v", evt.Lease.IPv6Subnet, evt.Lease.Attrs.PublicIPv6)
|
||||
|
||||
if len(routeList) > 0 && routeEqual(routeList[0], *route) {
|
||||
// Same Dst and same Gw, keep it and do not attempt to add it.
|
||||
log.Infof("Route to %v via %v dev index %d already exists, skipping.", evt.Lease.Subnet, evt.Lease.Attrs.PublicIP, routeList[0].LinkIndex)
|
||||
} else if err := netlink.RouteAdd(route); err != nil {
|
||||
log.Errorf("Error adding route to %v via %v dev index %d: %v", evt.Lease.Subnet, evt.Lease.Attrs.PublicIP, route.LinkIndex, err)
|
||||
continue
|
||||
route := n.GetV6Route(&evt.Lease)
|
||||
routeAdd(route, netlink.FAMILY_V6, n.addToV6RouteList, n.removeFromV6RouteList)
|
||||
}
|
||||
|
||||
case subnet.EventRemoved:
|
||||
log.Info("Subnet removed: ", evt.Lease.Subnet)
|
||||
|
||||
if evt.Lease.Attrs.BackendType != n.BackendType {
|
||||
log.Warningf("Ignoring non-%v subnet: type=%v", n.BackendType, evt.Lease.Attrs.BackendType)
|
||||
continue
|
||||
}
|
||||
|
||||
route := n.GetRoute(&evt.Lease)
|
||||
// Always remove the route from the route list.
|
||||
n.removeFromRouteList(*route)
|
||||
if evt.Lease.EnableIPv4 {
|
||||
log.Info("Subnet removed: ", evt.Lease.Subnet)
|
||||
|
||||
if err := netlink.RouteDel(route); err != nil {
|
||||
log.Errorf("Error deleting route to %v: %v", evt.Lease.Subnet, err)
|
||||
continue
|
||||
route := n.GetRoute(&evt.Lease)
|
||||
// Always remove the route from the route list.
|
||||
n.removeFromV4RouteList(*route)
|
||||
|
||||
if err := netlink.RouteDel(route); err != nil {
|
||||
log.Errorf("Error deleting route to %v: %v", evt.Lease.Subnet, err)
|
||||
}
|
||||
}
|
||||
|
||||
if evt.Lease.EnableIPv6 {
|
||||
log.Info("Subnet removed: ", evt.Lease.IPv6Subnet)
|
||||
|
||||
route := n.GetV6Route(&evt.Lease)
|
||||
// Always remove the route from the route list.
|
||||
n.removeFromV6RouteList(*route)
|
||||
|
||||
if err := netlink.RouteDel(route); err != nil {
|
||||
log.Errorf("Error deleting route to %v: %v", evt.Lease.IPv6Subnet, err)
|
||||
}
|
||||
}
|
||||
|
||||
default:
|
||||
@ -139,22 +139,74 @@ func (n *RouteNetwork) handleSubnetEvents(batch []subnet.Event) {
|
||||
}
|
||||
}
|
||||
|
||||
func (n *RouteNetwork) addToRouteList(route netlink.Route) {
|
||||
for _, r := range n.routes {
|
||||
if routeEqual(r, route) {
|
||||
func routeAdd(route *netlink.Route, ipFamily int, addToRouteList, removeFromRouteList func(netlink.Route)) {
|
||||
addToRouteList(*route)
|
||||
// Check if route exists before attempting to add it
|
||||
routeList, err := netlink.RouteListFiltered(ipFamily, &netlink.Route{Dst: route.Dst}, netlink.RT_FILTER_DST)
|
||||
if err != nil {
|
||||
log.Warningf("Unable to list routes: %v", err)
|
||||
}
|
||||
|
||||
if len(routeList) > 0 && !routeEqual(routeList[0], *route) {
|
||||
// Same Dst different Gw or different link index. Remove it, correct route will be added below.
|
||||
log.Warningf("Replacing existing route to %v with %v", routeList[0], route)
|
||||
if err := netlink.RouteDel(&routeList[0]); err != nil {
|
||||
log.Errorf("Effor deleteing route to %v: %v", routeList[0].Dst, err)
|
||||
return
|
||||
}
|
||||
removeFromRouteList(routeList[0])
|
||||
}
|
||||
routeList, err = netlink.RouteListFiltered(ipFamily, &netlink.Route{Dst: route.Dst}, netlink.RT_FILTER_DST)
|
||||
if err != nil {
|
||||
log.Warningf("Unable to list routes: %v", err)
|
||||
}
|
||||
|
||||
if len(routeList) > 0 && routeEqual(routeList[0], *route) {
|
||||
// Same Dst and same Gw, keep it and do not attempt to add it.
|
||||
log.Infof("Route to %v already exists, skipping.", route)
|
||||
} else if err := netlink.RouteAdd(route); err != nil {
|
||||
log.Errorf("Error adding route to %v", route)
|
||||
return
|
||||
}
|
||||
routeList, err = netlink.RouteListFiltered(ipFamily, &netlink.Route{Dst: route.Dst}, netlink.RT_FILTER_DST)
|
||||
if err != nil {
|
||||
log.Warningf("Unable to list routes: %v", err)
|
||||
}
|
||||
n.routes = append(n.routes, route)
|
||||
}
|
||||
|
||||
func (n *RouteNetwork) removeFromRouteList(route netlink.Route) {
|
||||
for index, r := range n.routes {
|
||||
if routeEqual(r, route) {
|
||||
n.routes = append(n.routes[:index], n.routes[index+1:]...)
|
||||
return
|
||||
func (n *RouteNetwork) addToRouteList(route netlink.Route) {
|
||||
n.routes = addToRouteList(&route, n.routes)
|
||||
}
|
||||
|
||||
func (n *RouteNetwork) addToV6RouteList(route netlink.Route) {
|
||||
n.v6Routes = addToRouteList(&route, n.v6Routes)
|
||||
}
|
||||
|
||||
func addToRouteList(route *netlink.Route, routes []netlink.Route) []netlink.Route {
|
||||
for _, r := range routes {
|
||||
if routeEqual(r, *route) {
|
||||
return routes
|
||||
}
|
||||
}
|
||||
return append(routes, *route)
|
||||
}
|
||||
|
||||
func (n *RouteNetwork) removeFromV4RouteList(route netlink.Route) {
|
||||
n.routes = n.removeFromRouteList(&route, n.routes)
|
||||
}
|
||||
|
||||
func (n *RouteNetwork) removeFromV6RouteList(route netlink.Route) {
|
||||
n.v6Routes = n.removeFromRouteList(&route, n.v6Routes)
|
||||
}
|
||||
|
||||
func (n *RouteNetwork) removeFromRouteList(route *netlink.Route, routes []netlink.Route) []netlink.Route {
|
||||
for index, r := range routes {
|
||||
if routeEqual(r, *route) {
|
||||
routes = append(routes[:index], routes[index+1:]...)
|
||||
return routes
|
||||
}
|
||||
}
|
||||
return routes
|
||||
}
|
||||
|
||||
func (n *RouteNetwork) routeCheck(ctx context.Context) {
|
||||
@ -163,15 +215,24 @@ func (n *RouteNetwork) routeCheck(ctx context.Context) {
|
||||
case <-ctx.Done():
|
||||
return
|
||||
case <-time.After(routeCheckRetries * time.Second):
|
||||
n.checkSubnetExistInRoutes()
|
||||
n.checkSubnetExistInV4Routes()
|
||||
n.checkSubnetExistInV6Routes()
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func (n *RouteNetwork) checkSubnetExistInRoutes() {
|
||||
routeList, err := netlink.RouteList(nil, netlink.FAMILY_V4)
|
||||
func (n *RouteNetwork) checkSubnetExistInV4Routes() {
|
||||
n.checkSubnetExistInRoutes(n.routes, netlink.FAMILY_V4)
|
||||
}
|
||||
|
||||
func (n *RouteNetwork) checkSubnetExistInV6Routes() {
|
||||
n.checkSubnetExistInRoutes(n.v6Routes, netlink.FAMILY_V6)
|
||||
}
|
||||
|
||||
func (n *RouteNetwork) checkSubnetExistInRoutes(routes []netlink.Route, ipFamily int) {
|
||||
routeList, err := netlink.RouteList(nil, ipFamily)
|
||||
if err == nil {
|
||||
for _, route := range n.routes {
|
||||
for _, route := range routes {
|
||||
exist := false
|
||||
for _, r := range routeList {
|
||||
if r.Dst == nil {
|
||||
|
3
vendor/github.com/flannel-io/flannel/backend/route_network_windows.go
generated
vendored
3
vendor/github.com/flannel-io/flannel/backend/route_network_windows.go
generated
vendored
@ -19,10 +19,9 @@ import (
|
||||
"sync"
|
||||
"time"
|
||||
|
||||
"golang.org/x/net/context"
|
||||
|
||||
"github.com/flannel-io/flannel/pkg/routing"
|
||||
"github.com/flannel-io/flannel/subnet"
|
||||
"golang.org/x/net/context"
|
||||
log "k8s.io/klog"
|
||||
)
|
||||
|
||||
|
3
vendor/github.com/flannel-io/flannel/backend/simple_network.go
generated
vendored
3
vendor/github.com/flannel-io/flannel/backend/simple_network.go
generated
vendored
@ -15,9 +15,8 @@
|
||||
package backend
|
||||
|
||||
import (
|
||||
"golang.org/x/net/context"
|
||||
|
||||
"github.com/flannel-io/flannel/subnet"
|
||||
"golang.org/x/net/context"
|
||||
)
|
||||
|
||||
type SimpleNetwork struct {
|
||||
|
70
vendor/github.com/flannel-io/flannel/backend/vxlan/device.go
generated
vendored
70
vendor/github.com/flannel-io/flannel/backend/vxlan/device.go
generated
vendored
@ -13,7 +13,6 @@
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
// +build !windows
|
||||
|
||||
package vxlan
|
||||
|
||||
@ -24,6 +23,7 @@ import (
|
||||
|
||||
"github.com/containernetworking/plugins/pkg/utils/sysctl"
|
||||
"github.com/flannel-io/flannel/pkg/ip"
|
||||
"github.com/flannel-io/flannel/pkg/mac"
|
||||
"github.com/vishvananda/netlink"
|
||||
log "k8s.io/klog"
|
||||
)
|
||||
@ -44,9 +44,15 @@ type vxlanDevice struct {
|
||||
}
|
||||
|
||||
func newVXLANDevice(devAttrs *vxlanDeviceAttrs) (*vxlanDevice, error) {
|
||||
hardwareAddr, err := mac.NewHardwareAddr()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
link := &netlink.Vxlan{
|
||||
LinkAttrs: netlink.LinkAttrs{
|
||||
Name: devAttrs.name,
|
||||
Name: devAttrs.name,
|
||||
HardwareAddr: hardwareAddr,
|
||||
},
|
||||
VxlanId: int(devAttrs.vni),
|
||||
VtepDevIndex: devAttrs.vtepIndex,
|
||||
@ -56,7 +62,7 @@ func newVXLANDevice(devAttrs *vxlanDeviceAttrs) (*vxlanDevice, error) {
|
||||
GBP: devAttrs.gbp,
|
||||
}
|
||||
|
||||
link, err := ensureLink(link)
|
||||
link, err = ensureLink(link)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
@ -124,6 +130,18 @@ func (dev *vxlanDevice) Configure(ipa ip.IP4Net, flannelnet ip.IP4Net) error {
|
||||
return nil
|
||||
}
|
||||
|
||||
func (dev *vxlanDevice) ConfigureIPv6(ipn ip.IP6Net, flannelnet ip.IP6Net) error {
|
||||
if err := ip.EnsureV6AddressOnLink(ipn, flannelnet, dev.link); err != nil {
|
||||
return fmt.Errorf("failed to ensure v6 address of interface %s: %w", dev.link.Attrs().Name, err)
|
||||
}
|
||||
|
||||
if err := netlink.LinkSetUp(dev.link); err != nil {
|
||||
return fmt.Errorf("failed to set v6 interface %s to UP state: %w", dev.link.Attrs().Name, err)
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func (dev *vxlanDevice) MACAddr() net.HardwareAddr {
|
||||
return dev.link.HardwareAddr
|
||||
}
|
||||
@ -131,6 +149,7 @@ func (dev *vxlanDevice) MACAddr() net.HardwareAddr {
|
||||
type neighbor struct {
|
||||
MAC net.HardwareAddr
|
||||
IP ip.IP4
|
||||
IP6 *ip.IP6
|
||||
}
|
||||
|
||||
func (dev *vxlanDevice) AddFDB(n neighbor) error {
|
||||
@ -145,6 +164,18 @@ func (dev *vxlanDevice) AddFDB(n neighbor) error {
|
||||
})
|
||||
}
|
||||
|
||||
func (dev *vxlanDevice) AddV6FDB(n neighbor) error {
|
||||
log.V(4).Infof("calling AddV6FDB: %v, %v", n.IP6, n.MAC)
|
||||
return netlink.NeighSet(&netlink.Neigh{
|
||||
LinkIndex: dev.link.Index,
|
||||
State: netlink.NUD_PERMANENT,
|
||||
Family: syscall.AF_BRIDGE,
|
||||
Flags: netlink.NTF_SELF,
|
||||
IP: n.IP6.ToIP(),
|
||||
HardwareAddr: n.MAC,
|
||||
})
|
||||
}
|
||||
|
||||
func (dev *vxlanDevice) DelFDB(n neighbor) error {
|
||||
log.V(4).Infof("calling DelFDB: %v, %v", n.IP, n.MAC)
|
||||
return netlink.NeighDel(&netlink.Neigh{
|
||||
@ -156,6 +187,17 @@ func (dev *vxlanDevice) DelFDB(n neighbor) error {
|
||||
})
|
||||
}
|
||||
|
||||
func (dev *vxlanDevice) DelV6FDB(n neighbor) error {
|
||||
log.V(4).Infof("calling DelV6FDB: %v, %v", n.IP6, n.MAC)
|
||||
return netlink.NeighDel(&netlink.Neigh{
|
||||
LinkIndex: dev.link.Index,
|
||||
Family: syscall.AF_BRIDGE,
|
||||
Flags: netlink.NTF_SELF,
|
||||
IP: n.IP6.ToIP(),
|
||||
HardwareAddr: n.MAC,
|
||||
})
|
||||
}
|
||||
|
||||
func (dev *vxlanDevice) AddARP(n neighbor) error {
|
||||
log.V(4).Infof("calling AddARP: %v, %v", n.IP, n.MAC)
|
||||
return netlink.NeighSet(&netlink.Neigh{
|
||||
@ -167,6 +209,17 @@ func (dev *vxlanDevice) AddARP(n neighbor) error {
|
||||
})
|
||||
}
|
||||
|
||||
func (dev *vxlanDevice) AddV6ARP(n neighbor) error {
|
||||
log.V(4).Infof("calling AddV6ARP: %v, %v", n.IP6, n.MAC)
|
||||
return netlink.NeighSet(&netlink.Neigh{
|
||||
LinkIndex: dev.link.Index,
|
||||
State: netlink.NUD_PERMANENT,
|
||||
Type: syscall.RTN_UNICAST,
|
||||
IP: n.IP6.ToIP(),
|
||||
HardwareAddr: n.MAC,
|
||||
})
|
||||
}
|
||||
|
||||
func (dev *vxlanDevice) DelARP(n neighbor) error {
|
||||
log.V(4).Infof("calling DelARP: %v, %v", n.IP, n.MAC)
|
||||
return netlink.NeighDel(&netlink.Neigh{
|
||||
@ -178,6 +231,17 @@ func (dev *vxlanDevice) DelARP(n neighbor) error {
|
||||
})
|
||||
}
|
||||
|
||||
func (dev *vxlanDevice) DelV6ARP(n neighbor) error {
|
||||
log.V(4).Infof("calling DelV6ARP: %v, %v", n.IP6, n.MAC)
|
||||
return netlink.NeighDel(&netlink.Neigh{
|
||||
LinkIndex: dev.link.Index,
|
||||
State: netlink.NUD_PERMANENT,
|
||||
Type: syscall.RTN_UNICAST,
|
||||
IP: n.IP6.ToIP(),
|
||||
HardwareAddr: n.MAC,
|
||||
})
|
||||
}
|
||||
|
||||
func vxlanLinksIncompat(l1, l2 netlink.Link) string {
|
||||
if l1.Type() != l2.Type() {
|
||||
return fmt.Sprintf("link type: %v vs %v", l1.Type(), l2.Type())
|
||||
|
104
vendor/github.com/flannel-io/flannel/backend/vxlan/vxlan.go
generated
vendored
104
vendor/github.com/flannel-io/flannel/backend/vxlan/vxlan.go
generated
vendored
@ -58,11 +58,10 @@ import (
|
||||
"net"
|
||||
"sync"
|
||||
|
||||
"golang.org/x/net/context"
|
||||
|
||||
"github.com/flannel-io/flannel/backend"
|
||||
"github.com/flannel-io/flannel/pkg/ip"
|
||||
"github.com/flannel-io/flannel/subnet"
|
||||
"golang.org/x/net/context"
|
||||
log "k8s.io/klog"
|
||||
)
|
||||
|
||||
@ -88,19 +87,34 @@ func New(sm subnet.Manager, extIface *backend.ExternalInterface) (backend.Backen
|
||||
return backend, nil
|
||||
}
|
||||
|
||||
func newSubnetAttrs(publicIP net.IP, vnid uint16, mac net.HardwareAddr) (*subnet.LeaseAttrs, error) {
|
||||
data, err := json.Marshal(&vxlanLeaseAttrs{
|
||||
VNI: vnid,
|
||||
VtepMAC: hardwareAddr(mac)})
|
||||
if err != nil {
|
||||
return nil, err
|
||||
func newSubnetAttrs(publicIP net.IP, publicIPv6 net.IP, vnid uint16, dev, v6Dev *vxlanDevice) (*subnet.LeaseAttrs, error) {
|
||||
leaseAttrs := &subnet.LeaseAttrs{
|
||||
BackendType: "vxlan",
|
||||
}
|
||||
if publicIP != nil && dev != nil {
|
||||
data, err := json.Marshal(&vxlanLeaseAttrs{
|
||||
VNI: vnid,
|
||||
VtepMAC: hardwareAddr(dev.MACAddr()),
|
||||
})
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
leaseAttrs.PublicIP = ip.FromIP(publicIP)
|
||||
leaseAttrs.BackendData = json.RawMessage(data)
|
||||
}
|
||||
|
||||
return &subnet.LeaseAttrs{
|
||||
PublicIP: ip.FromIP(publicIP),
|
||||
BackendType: "vxlan",
|
||||
BackendData: json.RawMessage(data),
|
||||
}, nil
|
||||
if publicIPv6 != nil && v6Dev != nil {
|
||||
data, err := json.Marshal(&vxlanLeaseAttrs{
|
||||
VNI: vnid,
|
||||
VtepMAC: hardwareAddr(v6Dev.MACAddr()),
|
||||
})
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
leaseAttrs.PublicIPv6 = ip.FromIP6(publicIPv6)
|
||||
leaseAttrs.BackendV6Data = json.RawMessage(data)
|
||||
}
|
||||
return leaseAttrs, nil
|
||||
}
|
||||
|
||||
func (be *VXLANBackend) RegisterNetwork(ctx context.Context, wg *sync.WaitGroup, config *subnet.Config) (backend.Network, error) {
|
||||
@ -122,23 +136,43 @@ func (be *VXLANBackend) RegisterNetwork(ctx context.Context, wg *sync.WaitGroup,
|
||||
}
|
||||
log.Infof("VXLAN config: VNI=%d Port=%d GBP=%v Learning=%v DirectRouting=%v", cfg.VNI, cfg.Port, cfg.GBP, cfg.Learning, cfg.DirectRouting)
|
||||
|
||||
devAttrs := vxlanDeviceAttrs{
|
||||
vni: uint32(cfg.VNI),
|
||||
name: fmt.Sprintf("flannel.%v", cfg.VNI),
|
||||
vtepIndex: be.extIface.Iface.Index,
|
||||
vtepAddr: be.extIface.IfaceAddr,
|
||||
vtepPort: cfg.Port,
|
||||
gbp: cfg.GBP,
|
||||
learning: cfg.Learning,
|
||||
var dev, v6Dev *vxlanDevice
|
||||
var err error
|
||||
if config.EnableIPv4 {
|
||||
devAttrs := vxlanDeviceAttrs{
|
||||
vni: uint32(cfg.VNI),
|
||||
name: fmt.Sprintf("flannel.%v", cfg.VNI),
|
||||
vtepIndex: be.extIface.Iface.Index,
|
||||
vtepAddr: be.extIface.IfaceAddr,
|
||||
vtepPort: cfg.Port,
|
||||
gbp: cfg.GBP,
|
||||
learning: cfg.Learning,
|
||||
}
|
||||
|
||||
dev, err = newVXLANDevice(&devAttrs)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
dev.directRouting = cfg.DirectRouting
|
||||
}
|
||||
if config.EnableIPv6 {
|
||||
v6DevAttrs := vxlanDeviceAttrs{
|
||||
vni: uint32(cfg.VNI),
|
||||
name: fmt.Sprintf("flannel-v6.%v", cfg.VNI),
|
||||
vtepIndex: be.extIface.Iface.Index,
|
||||
vtepAddr: be.extIface.IfaceV6Addr,
|
||||
vtepPort: cfg.Port,
|
||||
gbp: cfg.GBP,
|
||||
learning: cfg.Learning,
|
||||
}
|
||||
v6Dev, err = newVXLANDevice(&v6DevAttrs)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
v6Dev.directRouting = cfg.DirectRouting
|
||||
}
|
||||
|
||||
dev, err := newVXLANDevice(&devAttrs)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
dev.directRouting = cfg.DirectRouting
|
||||
|
||||
subnetAttrs, err := newSubnetAttrs(be.extIface.ExtAddr, uint16(cfg.VNI), dev.MACAddr())
|
||||
subnetAttrs, err := newSubnetAttrs(be.extIface.ExtAddr, be.extIface.ExtV6Addr, uint16(cfg.VNI), dev, v6Dev)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
@ -155,11 +189,17 @@ func (be *VXLANBackend) RegisterNetwork(ctx context.Context, wg *sync.WaitGroup,
|
||||
// Ensure that the device has a /32 address so that no broadcast routes are created.
|
||||
// This IP is just used as a source address for host to workload traffic (so
|
||||
// the return path for the traffic has an address on the flannel network to use as the destination)
|
||||
if err := dev.Configure(ip.IP4Net{IP: lease.Subnet.IP, PrefixLen: 32}, config.Network); err != nil {
|
||||
return nil, fmt.Errorf("failed to configure interface %s: %s", dev.link.Attrs().Name, err)
|
||||
if config.EnableIPv4 {
|
||||
if err := dev.Configure(ip.IP4Net{IP: lease.Subnet.IP, PrefixLen: 32}, config.Network); err != nil {
|
||||
return nil, fmt.Errorf("failed to configure interface %s: %w", dev.link.Attrs().Name, err)
|
||||
}
|
||||
}
|
||||
|
||||
return newNetwork(be.subnetMgr, be.extIface, dev, ip.IP4Net{}, lease)
|
||||
if config.EnableIPv6 {
|
||||
if err := v6Dev.ConfigureIPv6(ip.IP6Net{IP: lease.IPv6Subnet.IP, PrefixLen: 128}, config.IPv6Network); err != nil {
|
||||
return nil, fmt.Errorf("failed to configure interface %s: %w", v6Dev.link.Attrs().Name, err)
|
||||
}
|
||||
}
|
||||
return newNetwork(be.subnetMgr, be.extIface, dev, v6Dev, ip.IP4Net{}, lease)
|
||||
}
|
||||
|
||||
// So we can make it JSON (un)marshalable
|
||||
|
258
vendor/github.com/flannel-io/flannel/backend/vxlan/vxlan_network.go
generated
vendored
258
vendor/github.com/flannel-io/flannel/backend/vxlan/vxlan_network.go
generated
vendored
@ -21,18 +21,18 @@ import (
|
||||
"sync"
|
||||
"syscall"
|
||||
|
||||
"golang.org/x/net/context"
|
||||
|
||||
"github.com/flannel-io/flannel/backend"
|
||||
"github.com/flannel-io/flannel/pkg/ip"
|
||||
"github.com/flannel-io/flannel/subnet"
|
||||
"github.com/vishvananda/netlink"
|
||||
"golang.org/x/net/context"
|
||||
log "k8s.io/klog"
|
||||
)
|
||||
|
||||
type network struct {
|
||||
backend.SimpleNetwork
|
||||
dev *vxlanDevice
|
||||
v6Dev *vxlanDevice
|
||||
subnetMgr subnet.Manager
|
||||
}
|
||||
|
||||
@ -40,7 +40,7 @@ const (
|
||||
encapOverhead = 50
|
||||
)
|
||||
|
||||
func newNetwork(subnetMgr subnet.Manager, extIface *backend.ExternalInterface, dev *vxlanDevice, _ ip.IP4Net, lease *subnet.Lease) (*network, error) {
|
||||
func newNetwork(subnetMgr subnet.Manager, extIface *backend.ExternalInterface, dev *vxlanDevice, v6Dev *vxlanDevice, _ ip.IP4Net, lease *subnet.Lease) (*network, error) {
|
||||
nw := &network{
|
||||
SimpleNetwork: backend.SimpleNetwork{
|
||||
SubnetLease: lease,
|
||||
@ -48,6 +48,7 @@ func newNetwork(subnetMgr subnet.Manager, extIface *backend.ExternalInterface, d
|
||||
},
|
||||
subnetMgr: subnetMgr,
|
||||
dev: dev,
|
||||
v6Dev: v6Dev,
|
||||
}
|
||||
|
||||
return nw, nil
|
||||
@ -91,105 +92,214 @@ type vxlanLeaseAttrs struct {
|
||||
func (nw *network) handleSubnetEvents(batch []subnet.Event) {
|
||||
for _, event := range batch {
|
||||
sn := event.Lease.Subnet
|
||||
v6Sn := event.Lease.IPv6Subnet
|
||||
attrs := event.Lease.Attrs
|
||||
if attrs.BackendType != "vxlan" {
|
||||
log.Warningf("ignoring non-vxlan subnet(%s): type=%v", sn, attrs.BackendType)
|
||||
log.Warningf("ignoring non-vxlan v4Subnet(%s) v6Subnet(%s): type=%v", sn, v6Sn, attrs.BackendType)
|
||||
continue
|
||||
}
|
||||
|
||||
var vxlanAttrs vxlanLeaseAttrs
|
||||
if err := json.Unmarshal(attrs.BackendData, &vxlanAttrs); err != nil {
|
||||
log.Error("error decoding subnet lease JSON: ", err)
|
||||
continue
|
||||
var (
|
||||
vxlanAttrs, v6VxlanAttrs vxlanLeaseAttrs
|
||||
directRoutingOK, v6DirectRoutingOK bool
|
||||
directRoute, v6DirectRoute netlink.Route
|
||||
vxlanRoute, v6VxlanRoute netlink.Route
|
||||
)
|
||||
|
||||
if event.Lease.EnableIPv4 && nw.dev != nil {
|
||||
if err := json.Unmarshal(attrs.BackendData, &vxlanAttrs); err != nil {
|
||||
log.Error("error decoding subnet lease JSON: ", err)
|
||||
continue
|
||||
}
|
||||
|
||||
// This route is used when traffic should be vxlan encapsulated
|
||||
vxlanRoute = netlink.Route{
|
||||
LinkIndex: nw.dev.link.Attrs().Index,
|
||||
Scope: netlink.SCOPE_UNIVERSE,
|
||||
Dst: sn.ToIPNet(),
|
||||
Gw: sn.IP.ToIP(),
|
||||
}
|
||||
vxlanRoute.SetFlag(syscall.RTNH_F_ONLINK)
|
||||
|
||||
// directRouting is where the remote host is on the same subnet so vxlan isn't required.
|
||||
directRoute = netlink.Route{
|
||||
Dst: sn.ToIPNet(),
|
||||
Gw: attrs.PublicIP.ToIP(),
|
||||
}
|
||||
if nw.dev.directRouting {
|
||||
if dr, err := ip.DirectRouting(attrs.PublicIP.ToIP()); err != nil {
|
||||
log.Error(err)
|
||||
} else {
|
||||
directRoutingOK = dr
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// This route is used when traffic should be vxlan encapsulated
|
||||
vxlanRoute := netlink.Route{
|
||||
LinkIndex: nw.dev.link.Attrs().Index,
|
||||
Scope: netlink.SCOPE_UNIVERSE,
|
||||
Dst: sn.ToIPNet(),
|
||||
Gw: sn.IP.ToIP(),
|
||||
}
|
||||
vxlanRoute.SetFlag(syscall.RTNH_F_ONLINK)
|
||||
if event.Lease.EnableIPv6 && nw.v6Dev != nil {
|
||||
if err := json.Unmarshal(attrs.BackendV6Data, &v6VxlanAttrs); err != nil {
|
||||
log.Error("error decoding v6 subnet lease JSON: ", err)
|
||||
continue
|
||||
}
|
||||
if v6Sn.IP != nil && nw.v6Dev != nil {
|
||||
v6VxlanRoute = netlink.Route{
|
||||
LinkIndex: nw.v6Dev.link.Attrs().Index,
|
||||
Scope: netlink.SCOPE_UNIVERSE,
|
||||
Dst: v6Sn.ToIPNet(),
|
||||
Gw: v6Sn.IP.ToIP(),
|
||||
}
|
||||
v6VxlanRoute.SetFlag(syscall.RTNH_F_ONLINK)
|
||||
|
||||
// directRouting is where the remote host is on the same subnet so vxlan isn't required.
|
||||
directRoute := netlink.Route{
|
||||
Dst: sn.ToIPNet(),
|
||||
Gw: attrs.PublicIP.ToIP(),
|
||||
}
|
||||
var directRoutingOK = false
|
||||
if nw.dev.directRouting {
|
||||
if dr, err := ip.DirectRouting(attrs.PublicIP.ToIP()); err != nil {
|
||||
log.Error(err)
|
||||
} else {
|
||||
directRoutingOK = dr
|
||||
// directRouting is where the remote host is on the same subnet so vxlan isn't required.
|
||||
v6DirectRoute = netlink.Route{
|
||||
Dst: v6Sn.ToIPNet(),
|
||||
Gw: attrs.PublicIPv6.ToIP(),
|
||||
}
|
||||
|
||||
if nw.v6Dev.directRouting {
|
||||
if v6Dr, err := ip.DirectRouting(attrs.PublicIPv6.ToIP()); err != nil {
|
||||
log.Error(err)
|
||||
} else {
|
||||
v6DirectRoutingOK = v6Dr
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
switch event.Type {
|
||||
case subnet.EventAdded:
|
||||
if directRoutingOK {
|
||||
log.V(2).Infof("Adding direct route to subnet: %s PublicIP: %s", sn, attrs.PublicIP)
|
||||
if event.Lease.EnableIPv4 {
|
||||
if directRoutingOK {
|
||||
log.V(2).Infof("Adding direct route to subnet: %s PublicIP: %s", sn, attrs.PublicIP)
|
||||
|
||||
if err := netlink.RouteReplace(&directRoute); err != nil {
|
||||
log.Errorf("Error adding route to %v via %v: %v", sn, attrs.PublicIP, err)
|
||||
continue
|
||||
}
|
||||
} else {
|
||||
log.V(2).Infof("adding subnet: %s PublicIP: %s VtepMAC: %s", sn, attrs.PublicIP, net.HardwareAddr(vxlanAttrs.VtepMAC))
|
||||
if err := nw.dev.AddARP(neighbor{IP: sn.IP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
|
||||
log.Error("AddARP failed: ", err)
|
||||
continue
|
||||
}
|
||||
|
||||
if err := nw.dev.AddFDB(neighbor{IP: attrs.PublicIP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
|
||||
log.Error("AddFDB failed: ", err)
|
||||
|
||||
// Try to clean up the ARP entry then continue
|
||||
if err := nw.dev.DelARP(neighbor{IP: event.Lease.Subnet.IP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
|
||||
log.Error("DelARP failed: ", err)
|
||||
if err := netlink.RouteReplace(&directRoute); err != nil {
|
||||
log.Errorf("Error adding route to %v via %v: %v", sn, attrs.PublicIP, err)
|
||||
continue
|
||||
}
|
||||
} else {
|
||||
log.V(2).Infof("adding subnet: %s PublicIP: %s VtepMAC: %s", sn, attrs.PublicIP, net.HardwareAddr(vxlanAttrs.VtepMAC))
|
||||
if err := nw.dev.AddARP(neighbor{IP: sn.IP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
|
||||
log.Error("AddARP failed: ", err)
|
||||
continue
|
||||
}
|
||||
|
||||
continue
|
||||
if err := nw.dev.AddFDB(neighbor{IP: attrs.PublicIP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
|
||||
log.Error("AddFDB failed: ", err)
|
||||
|
||||
// Try to clean up the ARP entry then continue
|
||||
if err := nw.dev.DelARP(neighbor{IP: event.Lease.Subnet.IP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
|
||||
log.Error("DelARP failed: ", err)
|
||||
}
|
||||
|
||||
continue
|
||||
}
|
||||
|
||||
// Set the route - the kernel would ARP for the Gw IP address if it hadn't already been set above so make sure
|
||||
// this is done last.
|
||||
if err := netlink.RouteReplace(&vxlanRoute); err != nil {
|
||||
log.Errorf("failed to add vxlanRoute (%s -> %s): %v", vxlanRoute.Dst, vxlanRoute.Gw, err)
|
||||
|
||||
// Try to clean up both the ARP and FDB entries then continue
|
||||
if err := nw.dev.DelARP(neighbor{IP: event.Lease.Subnet.IP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
|
||||
log.Error("DelARP failed: ", err)
|
||||
}
|
||||
|
||||
if err := nw.dev.DelFDB(neighbor{IP: event.Lease.Attrs.PublicIP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
|
||||
log.Error("DelFDB failed: ", err)
|
||||
}
|
||||
|
||||
continue
|
||||
}
|
||||
}
|
||||
}
|
||||
if event.Lease.EnableIPv6 {
|
||||
if v6DirectRoutingOK {
|
||||
log.V(2).Infof("Adding v6 direct route to v6 subnet: %s PublicIPv6: %s", v6Sn, attrs.PublicIPv6)
|
||||
|
||||
// Set the route - the kernel would ARP for the Gw IP address if it hadn't already been set above so make sure
|
||||
// this is done last.
|
||||
if err := netlink.RouteReplace(&vxlanRoute); err != nil {
|
||||
log.Errorf("failed to add vxlanRoute (%s -> %s): %v", vxlanRoute.Dst, vxlanRoute.Gw, err)
|
||||
|
||||
// Try to clean up both the ARP and FDB entries then continue
|
||||
if err := nw.dev.DelARP(neighbor{IP: event.Lease.Subnet.IP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
|
||||
log.Error("DelARP failed: ", err)
|
||||
if err := netlink.RouteReplace(&v6DirectRoute); err != nil {
|
||||
log.Errorf("Error adding v6 route to %v via %v: %v", v6Sn, attrs.PublicIPv6, err)
|
||||
continue
|
||||
}
|
||||
} else {
|
||||
log.V(2).Infof("adding v6 subnet: %s PublicIPv6: %s VtepMAC: %s", v6Sn, attrs.PublicIPv6, net.HardwareAddr(v6VxlanAttrs.VtepMAC))
|
||||
if err := nw.v6Dev.AddV6ARP(neighbor{IP6: v6Sn.IP, MAC: net.HardwareAddr(v6VxlanAttrs.VtepMAC)}); err != nil {
|
||||
log.Error("AddV6ARP failed: ", err)
|
||||
continue
|
||||
}
|
||||
|
||||
if err := nw.dev.DelFDB(neighbor{IP: event.Lease.Attrs.PublicIP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
|
||||
log.Error("DelFDB failed: ", err)
|
||||
if err := nw.v6Dev.AddV6FDB(neighbor{IP6: attrs.PublicIPv6, MAC: net.HardwareAddr(v6VxlanAttrs.VtepMAC)}); err != nil {
|
||||
log.Error("AddV6FDB failed: ", err)
|
||||
|
||||
// Try to clean up the ARP entry then continue
|
||||
if err := nw.v6Dev.DelV6ARP(neighbor{IP6: event.Lease.IPv6Subnet.IP, MAC: net.HardwareAddr(v6VxlanAttrs.VtepMAC)}); err != nil {
|
||||
log.Error("DelV6ARP failed: ", err)
|
||||
}
|
||||
|
||||
continue
|
||||
}
|
||||
|
||||
continue
|
||||
// Set the route - the kernel would ARP for the Gw IP address if it hadn't already been set above so make sure
|
||||
// this is done last.
|
||||
if err := netlink.RouteReplace(&v6VxlanRoute); err != nil {
|
||||
log.Errorf("failed to add v6 vxlanRoute (%s -> %s): %v", v6VxlanRoute.Dst, v6VxlanRoute.Gw, err)
|
||||
|
||||
// Try to clean up both the ARP and FDB entries then continue
|
||||
if err := nw.v6Dev.DelV6ARP(neighbor{IP6: event.Lease.IPv6Subnet.IP, MAC: net.HardwareAddr(v6VxlanAttrs.VtepMAC)}); err != nil {
|
||||
log.Error("DelV6ARP failed: ", err)
|
||||
}
|
||||
|
||||
if err := nw.v6Dev.DelV6FDB(neighbor{IP6: event.Lease.Attrs.PublicIPv6, MAC: net.HardwareAddr(v6VxlanAttrs.VtepMAC)}); err != nil {
|
||||
log.Error("DelV6FDB failed: ", err)
|
||||
}
|
||||
|
||||
continue
|
||||
}
|
||||
}
|
||||
}
|
||||
case subnet.EventRemoved:
|
||||
if directRoutingOK {
|
||||
log.V(2).Infof("Removing direct route to subnet: %s PublicIP: %s", sn, attrs.PublicIP)
|
||||
if err := netlink.RouteDel(&directRoute); err != nil {
|
||||
log.Errorf("Error deleting route to %v via %v: %v", sn, attrs.PublicIP, err)
|
||||
}
|
||||
} else {
|
||||
log.V(2).Infof("removing subnet: %s PublicIP: %s VtepMAC: %s", sn, attrs.PublicIP, net.HardwareAddr(vxlanAttrs.VtepMAC))
|
||||
if event.Lease.EnableIPv4 {
|
||||
if directRoutingOK {
|
||||
log.V(2).Infof("Removing direct route to subnet: %s PublicIP: %s", sn, attrs.PublicIP)
|
||||
if err := netlink.RouteDel(&directRoute); err != nil {
|
||||
log.Errorf("Error deleting route to %v via %v: %v", sn, attrs.PublicIP, err)
|
||||
}
|
||||
} else {
|
||||
log.V(2).Infof("removing subnet: %s PublicIP: %s VtepMAC: %s", sn, attrs.PublicIP, net.HardwareAddr(vxlanAttrs.VtepMAC))
|
||||
|
||||
// Try to remove all entries - don't bail out if one of them fails.
|
||||
if err := nw.dev.DelARP(neighbor{IP: sn.IP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
|
||||
log.Error("DelARP failed: ", err)
|
||||
}
|
||||
// Try to remove all entries - don't bail out if one of them fails.
|
||||
if err := nw.dev.DelARP(neighbor{IP: sn.IP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
|
||||
log.Error("DelARP failed: ", err)
|
||||
}
|
||||
|
||||
if err := nw.dev.DelFDB(neighbor{IP: attrs.PublicIP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
|
||||
log.Error("DelFDB failed: ", err)
|
||||
}
|
||||
if err := nw.dev.DelFDB(neighbor{IP: attrs.PublicIP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
|
||||
log.Error("DelFDB failed: ", err)
|
||||
}
|
||||
|
||||
if err := netlink.RouteDel(&vxlanRoute); err != nil {
|
||||
log.Errorf("failed to delete vxlanRoute (%s -> %s): %v", vxlanRoute.Dst, vxlanRoute.Gw, err)
|
||||
if err := netlink.RouteDel(&vxlanRoute); err != nil {
|
||||
log.Errorf("failed to delete vxlanRoute (%s -> %s): %v", vxlanRoute.Dst, vxlanRoute.Gw, err)
|
||||
}
|
||||
}
|
||||
}
|
||||
if event.Lease.EnableIPv6 {
|
||||
if v6DirectRoutingOK {
|
||||
log.V(2).Infof("Removing v6 direct route to subnet: %s PublicIP: %s", sn, attrs.PublicIPv6)
|
||||
if err := netlink.RouteDel(&directRoute); err != nil {
|
||||
log.Errorf("Error deleting v6 route to %v via %v: %v", v6Sn, attrs.PublicIPv6, err)
|
||||
}
|
||||
} else {
|
||||
log.V(2).Infof("removing v6subnet: %s PublicIPv6: %s VtepMAC: %s", v6Sn, attrs.PublicIPv6, net.HardwareAddr(v6VxlanAttrs.VtepMAC))
|
||||
|
||||
// Try to remove all entries - don't bail out if one of them fails.
|
||||
if err := nw.v6Dev.DelV6ARP(neighbor{IP6: v6Sn.IP, MAC: net.HardwareAddr(v6VxlanAttrs.VtepMAC)}); err != nil {
|
||||
log.Error("DelV6ARP failed: ", err)
|
||||
}
|
||||
|
||||
if err := nw.v6Dev.DelV6FDB(neighbor{IP6: attrs.PublicIPv6, MAC: net.HardwareAddr(v6VxlanAttrs.VtepMAC)}); err != nil {
|
||||
log.Error("DelV6FDB failed: ", err)
|
||||
}
|
||||
|
||||
if err := netlink.RouteDel(&v6VxlanRoute); err != nil {
|
||||
log.Errorf("failed to delete v6 vxlanRoute (%s -> %s): %v", v6VxlanRoute.Dst, v6VxlanRoute.Gw, err)
|
||||
}
|
||||
}
|
||||
}
|
||||
default:
|
||||
|
3
vendor/github.com/flannel-io/flannel/backend/vxlan/vxlan_network_windows.go
generated
vendored
3
vendor/github.com/flannel-io/flannel/backend/vxlan/vxlan_network_windows.go
generated
vendored
@ -20,12 +20,11 @@ import (
|
||||
"strings"
|
||||
"sync"
|
||||
|
||||
"golang.org/x/net/context"
|
||||
|
||||
"github.com/Microsoft/hcsshim/hcn"
|
||||
"github.com/flannel-io/flannel/backend"
|
||||
"github.com/flannel-io/flannel/pkg/ip"
|
||||
"github.com/flannel-io/flannel/subnet"
|
||||
"golang.org/x/net/context"
|
||||
log "k8s.io/klog"
|
||||
)
|
||||
|
||||
|
3
vendor/github.com/flannel-io/flannel/backend/vxlan/vxlan_windows.go
generated
vendored
3
vendor/github.com/flannel-io/flannel/backend/vxlan/vxlan_windows.go
generated
vendored
@ -30,12 +30,11 @@ import (
|
||||
"net"
|
||||
"sync"
|
||||
|
||||
"golang.org/x/net/context"
|
||||
|
||||
"github.com/Microsoft/hcsshim/hcn"
|
||||
"github.com/flannel-io/flannel/backend"
|
||||
"github.com/flannel-io/flannel/pkg/ip"
|
||||
"github.com/flannel-io/flannel/subnet"
|
||||
"golang.org/x/net/context"
|
||||
log "k8s.io/klog"
|
||||
)
|
||||
|
||||
|
68
vendor/github.com/flannel-io/flannel/network/iptables.go
generated
vendored
68
vendor/github.com/flannel-io/flannel/network/iptables.go
generated
vendored
@ -77,6 +77,40 @@ func MasqRules(ipn ip.IP4Net, lease *subnet.Lease) []IPTablesRule {
|
||||
}
|
||||
}
|
||||
|
||||
func MasqIP6Rules(ipn ip.IP6Net, lease *subnet.Lease) []IPTablesRule {
|
||||
n := ipn.String()
|
||||
sn := lease.IPv6Subnet.String()
|
||||
supports_random_fully := false
|
||||
ipt, err := iptables.NewWithProtocol(iptables.ProtocolIPv6)
|
||||
if err == nil {
|
||||
supports_random_fully = ipt.HasRandomFully()
|
||||
}
|
||||
|
||||
if supports_random_fully {
|
||||
return []IPTablesRule{
|
||||
// This rule makes sure we don't NAT traffic within overlay network (e.g. coming out of docker0)
|
||||
{"nat", "POSTROUTING", []string{"-s", n, "-d", n, "-j", "RETURN"}},
|
||||
// NAT if it's not multicast traffic
|
||||
{"nat", "POSTROUTING", []string{"-s", n, "!", "-d", "ff00::/8", "-j", "MASQUERADE", "--random-fully"}},
|
||||
// Prevent performing Masquerade on external traffic which arrives from a Node that owns the container/pod IP address
|
||||
{"nat", "POSTROUTING", []string{"!", "-s", n, "-d", sn, "-j", "RETURN"}},
|
||||
// Masquerade anything headed towards flannel from the host
|
||||
{"nat", "POSTROUTING", []string{"!", "-s", n, "-d", n, "-j", "MASQUERADE", "--random-fully"}},
|
||||
}
|
||||
} else {
|
||||
return []IPTablesRule{
|
||||
// This rule makes sure we don't NAT traffic within overlay network (e.g. coming out of docker0)
|
||||
{"nat", "POSTROUTING", []string{"-s", n, "-d", n, "-j", "RETURN"}},
|
||||
// NAT if it's not multicast traffic
|
||||
{"nat", "POSTROUTING", []string{"-s", n, "!", "-d", "ff00::/8", "-j", "MASQUERADE"}},
|
||||
// Prevent performing Masquerade on external traffic which arrives from a Node that owns the container/pod IP address
|
||||
{"nat", "POSTROUTING", []string{"!", "-s", n, "-d", sn, "-j", "RETURN"}},
|
||||
// Masquerade anything headed towards flannel from the host
|
||||
{"nat", "POSTROUTING", []string{"!", "-s", n, "-d", n, "-j", "MASQUERADE"}},
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func ForwardRules(flannelNetwork string) []IPTablesRule {
|
||||
return []IPTablesRule{
|
||||
// These rules allow traffic to be forwarded if it is to or from the flannel network range.
|
||||
@ -122,6 +156,28 @@ func SetupAndEnsureIPTables(rules []IPTablesRule, resyncPeriod int) {
|
||||
}
|
||||
}
|
||||
|
||||
func SetupAndEnsureIP6Tables(rules []IPTablesRule, resyncPeriod int) {
|
||||
ipt, err := iptables.NewWithProtocol(iptables.ProtocolIPv6)
|
||||
if err != nil {
|
||||
// if we can't find iptables, give up and return
|
||||
log.Errorf("Failed to setup IP6Tables. iptables binary was not found: %v", err)
|
||||
return
|
||||
}
|
||||
|
||||
defer func() {
|
||||
teardownIPTables(ipt, rules)
|
||||
}()
|
||||
|
||||
for {
|
||||
// Ensure that all the iptables rules exist every 5 seconds
|
||||
if err := ensureIPTables(ipt, rules); err != nil {
|
||||
log.Errorf("Failed to ensure iptables rules: %v", err)
|
||||
}
|
||||
|
||||
time.Sleep(time.Duration(resyncPeriod) * time.Second)
|
||||
}
|
||||
}
|
||||
|
||||
// DeleteIPTables delete specified iptables rules
|
||||
func DeleteIPTables(rules []IPTablesRule) error {
|
||||
ipt, err := iptables.New()
|
||||
@ -134,6 +190,18 @@ func DeleteIPTables(rules []IPTablesRule) error {
|
||||
return nil
|
||||
}
|
||||
|
||||
// DeleteIP6Tables delete specified iptables rules
|
||||
func DeleteIP6Tables(rules []IPTablesRule) error {
|
||||
ipt, err := iptables.NewWithProtocol(iptables.ProtocolIPv6)
|
||||
if err != nil {
|
||||
// if we can't find iptables, give up and return
|
||||
log.Errorf("Failed to setup IP6Tables. iptables binary was not found: %v", err)
|
||||
return err
|
||||
}
|
||||
teardownIPTables(ipt, rules)
|
||||
return nil
|
||||
}
|
||||
|
||||
func ensureIPTables(ipt IPTables, rules []IPTablesRule) error {
|
||||
exists, err := ipTablesRulesExist(ipt, rules)
|
||||
if err != nil {
|
||||
|
26
vendor/github.com/flannel-io/flannel/network/iptables_windows.go
generated
vendored
26
vendor/github.com/flannel-io/flannel/network/iptables_windows.go
generated
vendored
@ -31,21 +31,11 @@ type IPTablesRule struct {
|
||||
rulespec []string
|
||||
}
|
||||
|
||||
func MasqRules(ipn ip.IP4Net, lease *subnet.Lease) []IPTablesRule {
|
||||
return nil
|
||||
}
|
||||
|
||||
func ForwardRules(flannelNetwork string) []IPTablesRule {
|
||||
return nil
|
||||
}
|
||||
|
||||
func SetupAndEnsureIPTables(rules []IPTablesRule, resyncPeriod int) {
|
||||
|
||||
}
|
||||
|
||||
func DeleteIPTables(rules []IPTablesRule) error {
|
||||
return nil
|
||||
}
|
||||
|
||||
func teardownIPTables(ipt IPTables, rules []IPTablesRule) {
|
||||
}
|
||||
func MasqRules(ipn ip.IP4Net, lease *subnet.Lease) []IPTablesRule { return nil }
|
||||
func ForwardRules(flannelNetwork string) []IPTablesRule { return nil }
|
||||
func SetupAndEnsureIPTables(rules []IPTablesRule, resyncPeriod int) {}
|
||||
func DeleteIPTables(rules []IPTablesRule) error { return nil }
|
||||
func teardownIPTables(ipt IPTables, rules []IPTablesRule) {}
|
||||
func SetupAndEnsureIP6Tables(rules []IPTablesRule, resyncPeriod int) {}
|
||||
func MasqIP6Rules(ipn ip.IP6Net, lease *subnet.Lease) []IPTablesRule { return nil }
|
||||
func DeleteIP6Tables(rules []IPTablesRule) error { return nil }
|
||||
|
132
vendor/github.com/flannel-io/flannel/pkg/ip/iface.go
generated
vendored
132
vendor/github.com/flannel-io/flannel/pkg/ip/iface.go
generated
vendored
@ -36,6 +36,16 @@ func getIfaceAddrs(iface *net.Interface) ([]netlink.Addr, error) {
|
||||
return netlink.AddrList(link, syscall.AF_INET)
|
||||
}
|
||||
|
||||
func getIfaceV6Addrs(iface *net.Interface) ([]netlink.Addr, error) {
|
||||
link := &netlink.Device{
|
||||
netlink.LinkAttrs{
|
||||
Index: iface.Index,
|
||||
},
|
||||
}
|
||||
|
||||
return netlink.AddrList(link, syscall.AF_INET6)
|
||||
}
|
||||
|
||||
func GetInterfaceIP4Addr(iface *net.Interface) (net.IP, error) {
|
||||
addrs, err := getIfaceAddrs(iface)
|
||||
if err != nil {
|
||||
@ -67,6 +77,37 @@ func GetInterfaceIP4Addr(iface *net.Interface) (net.IP, error) {
|
||||
return nil, errors.New("No IPv4 address found for given interface")
|
||||
}
|
||||
|
||||
func GetInterfaceIP6Addr(iface *net.Interface) (net.IP, error) {
|
||||
addrs, err := getIfaceV6Addrs(iface)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
// prefer non link-local addr
|
||||
var ll net.IP
|
||||
|
||||
for _, addr := range addrs {
|
||||
if addr.IP.To16() == nil {
|
||||
continue
|
||||
}
|
||||
|
||||
if addr.IP.IsGlobalUnicast() {
|
||||
return addr.IP, nil
|
||||
}
|
||||
|
||||
if addr.IP.IsLinkLocalUnicast() {
|
||||
ll = addr.IP
|
||||
}
|
||||
}
|
||||
|
||||
if ll != nil {
|
||||
// didn't find global but found link-local. it'll do.
|
||||
return ll, nil
|
||||
}
|
||||
|
||||
return nil, errors.New("No IPv6 address found for given interface")
|
||||
}
|
||||
|
||||
func GetInterfaceIP4AddrMatch(iface *net.Interface, matchAddr net.IP) error {
|
||||
addrs, err := getIfaceAddrs(iface)
|
||||
if err != nil {
|
||||
@ -86,6 +127,25 @@ func GetInterfaceIP4AddrMatch(iface *net.Interface, matchAddr net.IP) error {
|
||||
return errors.New("No IPv4 address found for given interface")
|
||||
}
|
||||
|
||||
func GetInterfaceIP6AddrMatch(iface *net.Interface, matchAddr net.IP) error {
|
||||
addrs, err := getIfaceV6Addrs(iface)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
for _, addr := range addrs {
|
||||
// Attempt to parse the address in CIDR notation
|
||||
// and assert it is IPv6
|
||||
if addr.IP.To16() != nil {
|
||||
if addr.IP.To16().Equal(matchAddr) {
|
||||
return nil
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
return errors.New("No IPv6 address found for given interface")
|
||||
}
|
||||
|
||||
func GetDefaultGatewayInterface() (*net.Interface, error) {
|
||||
routes, err := netlink.RouteList(nil, syscall.AF_INET)
|
||||
if err != nil {
|
||||
@ -104,6 +164,24 @@ func GetDefaultGatewayInterface() (*net.Interface, error) {
|
||||
return nil, errors.New("Unable to find default route")
|
||||
}
|
||||
|
||||
func GetDefaultV6GatewayInterface() (*net.Interface, error) {
|
||||
routes, err := netlink.RouteList(nil, syscall.AF_INET6)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
for _, route := range routes {
|
||||
if route.Dst == nil || route.Dst.String() == "::/0" {
|
||||
if route.LinkIndex <= 0 {
|
||||
return nil, errors.New("Found default v6 route but could not determine interface")
|
||||
}
|
||||
return net.InterfaceByIndex(route.LinkIndex)
|
||||
}
|
||||
}
|
||||
|
||||
return nil, errors.New("Unable to find default v6 route")
|
||||
}
|
||||
|
||||
func GetInterfaceByIP(ip net.IP) (*net.Interface, error) {
|
||||
ifaces, err := net.Interfaces()
|
||||
if err != nil {
|
||||
@ -120,6 +198,22 @@ func GetInterfaceByIP(ip net.IP) (*net.Interface, error) {
|
||||
return nil, errors.New("No interface with given IP found")
|
||||
}
|
||||
|
||||
func GetInterfaceByIP6(ip net.IP) (*net.Interface, error) {
|
||||
ifaces, err := net.Interfaces()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
for _, iface := range ifaces {
|
||||
err := GetInterfaceIP6AddrMatch(&iface, ip)
|
||||
if err == nil {
|
||||
return &iface, nil
|
||||
}
|
||||
}
|
||||
|
||||
return nil, errors.New("No interface with given IPv6 found")
|
||||
}
|
||||
|
||||
func DirectRouting(ip net.IP) (bool, error) {
|
||||
routes, err := netlink.RouteGet(ip)
|
||||
if err != nil {
|
||||
@ -164,3 +258,41 @@ func EnsureV4AddressOnLink(ipa IP4Net, ipn IP4Net, link netlink.Link) error {
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
// EnsureV6AddressOnLink ensures that there is only one v6 Addr on `link` and it equals `ipn`.
|
||||
// If there exist multiple addresses on link, it returns an error message to tell callers to remove additional address.
|
||||
func EnsureV6AddressOnLink(ipa IP6Net, ipn IP6Net, link netlink.Link) error {
|
||||
addr := netlink.Addr{IPNet: ipa.ToIPNet()}
|
||||
existingAddrs, err := netlink.AddrList(link, netlink.FAMILY_V6)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
onlyLinkLocal := true
|
||||
for _, existingAddr := range existingAddrs {
|
||||
if !existingAddr.IP.IsLinkLocalUnicast() {
|
||||
if !existingAddr.Equal(addr) {
|
||||
if err := netlink.AddrDel(link, &existingAddr); err != nil {
|
||||
return fmt.Errorf("failed to remove v6 IP address %s from %s: %w", ipn.String(), link.Attrs().Name, err)
|
||||
}
|
||||
existingAddrs = []netlink.Addr{}
|
||||
onlyLinkLocal = false
|
||||
} else {
|
||||
return nil
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if onlyLinkLocal {
|
||||
existingAddrs = []netlink.Addr{}
|
||||
}
|
||||
|
||||
// Actually add the desired address to the interface if needed.
|
||||
if len(existingAddrs) == 0 {
|
||||
if err := netlink.AddrAdd(link, &addr); err != nil {
|
||||
return fmt.Errorf("failed to add v6 IP address %s to %s: %w", ipn.String(), link.Attrs().Name, err)
|
||||
}
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
7
vendor/github.com/flannel-io/flannel/pkg/ip/iface_windows.go
generated
vendored
7
vendor/github.com/flannel-io/flannel/pkg/ip/iface_windows.go
generated
vendored
@ -19,8 +19,9 @@ package ip
|
||||
import (
|
||||
"errors"
|
||||
"fmt"
|
||||
"github.com/flannel-io/flannel/pkg/powershell"
|
||||
"net"
|
||||
|
||||
"github.com/flannel-io/flannel/pkg/powershell"
|
||||
)
|
||||
|
||||
// GetInterfaceIP4Addr returns the IPv4 address for the given network interface
|
||||
@ -143,3 +144,7 @@ func IsForwardingEnabledForInterface(iface *net.Interface) (bool, error) {
|
||||
|
||||
return powerShellJsonData.Forwarding == 1, nil
|
||||
}
|
||||
|
||||
func GetInterfaceByIP6(ip net.IP) (*net.Interface, error) { return nil, nil }
|
||||
func GetInterfaceIP6Addr(iface *net.Interface) (net.IP, error) { return nil, nil }
|
||||
func GetDefaultV6GatewayInterface() (*net.Interface, error) { return nil, nil }
|
||||
|
210
vendor/github.com/flannel-io/flannel/pkg/ip/ip6net.go
generated
vendored
Normal file
210
vendor/github.com/flannel-io/flannel/pkg/ip/ip6net.go
generated
vendored
Normal file
@ -0,0 +1,210 @@
|
||||
// Copyright 2015 flannel authors
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
package ip
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"errors"
|
||||
"fmt"
|
||||
"math/big"
|
||||
"net"
|
||||
)
|
||||
|
||||
type IP6 big.Int
|
||||
|
||||
func FromIP16Bytes(ip []byte) *IP6 {
|
||||
return (*IP6)(big.NewInt(0).SetBytes(ip))
|
||||
}
|
||||
|
||||
func FromIP6(ip net.IP) *IP6 {
|
||||
ipv6 := ip.To16()
|
||||
|
||||
if ipv6 == nil {
|
||||
panic("Address is not an IPv6 address")
|
||||
}
|
||||
|
||||
return FromIP16Bytes(ipv6)
|
||||
}
|
||||
|
||||
func ParseIP6(s string) (*IP6, error) {
|
||||
ip := net.ParseIP(s)
|
||||
if ip == nil {
|
||||
return (*IP6)(big.NewInt(0)), errors.New("Invalid IP address format")
|
||||
}
|
||||
return FromIP6(ip), nil
|
||||
}
|
||||
|
||||
func Mask(prefixLen int) *big.Int {
|
||||
mask := net.CIDRMask(prefixLen, 128)
|
||||
return big.NewInt(0).SetBytes(mask)
|
||||
}
|
||||
|
||||
func IsEmpty(subnet *IP6) bool {
|
||||
if subnet == nil || (*big.Int)(subnet).Cmp(big.NewInt(0)) == 0 {
|
||||
return true
|
||||
}
|
||||
return false
|
||||
}
|
||||
|
||||
func GetIPv6SubnetMin(networkIP *IP6, subnetSize *big.Int) *IP6 {
|
||||
return (*IP6)(big.NewInt(0).Add((*big.Int)(networkIP), subnetSize))
|
||||
}
|
||||
|
||||
func GetIPv6SubnetMax(networkIP *IP6, subnetSize *big.Int) *IP6 {
|
||||
return (*IP6)(big.NewInt(0).Sub((*big.Int)(networkIP), subnetSize))
|
||||
}
|
||||
|
||||
func CheckIPv6Subnet(subnetIP *IP6, mask *big.Int) bool {
|
||||
if (*big.Int)(subnetIP).Cmp(big.NewInt(0).And((*big.Int)(subnetIP), mask)) != 0 {
|
||||
return false
|
||||
}
|
||||
return true
|
||||
}
|
||||
|
||||
func MustParseIP6(s string) *IP6 {
|
||||
ip, err := ParseIP6(s)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
return ip
|
||||
}
|
||||
|
||||
func (ip6 *IP6) ToIP() net.IP {
|
||||
ip := net.IP((*big.Int)(ip6).Bytes())
|
||||
if ip.To4() != nil {
|
||||
return ip
|
||||
}
|
||||
a := (*big.Int)(ip6).FillBytes(make([]byte, 16))
|
||||
return a
|
||||
}
|
||||
|
||||
func (ip6 IP6) String() string {
|
||||
return ip6.ToIP().String()
|
||||
}
|
||||
|
||||
// MarshalJSON: json.Marshaler impl
|
||||
func (ip6 IP6) MarshalJSON() ([]byte, error) {
|
||||
return []byte(fmt.Sprintf(`"%s"`, ip6)), nil
|
||||
}
|
||||
|
||||
// UnmarshalJSON: json.Unmarshaler impl
|
||||
func (ip6 *IP6) UnmarshalJSON(j []byte) error {
|
||||
j = bytes.Trim(j, "\"")
|
||||
if val, err := ParseIP6(string(j)); err != nil {
|
||||
return err
|
||||
} else {
|
||||
*ip6 = *val
|
||||
return nil
|
||||
}
|
||||
}
|
||||
|
||||
// similar to net.IPNet but has uint based representation
|
||||
type IP6Net struct {
|
||||
IP *IP6
|
||||
PrefixLen uint
|
||||
}
|
||||
|
||||
func (n IP6Net) String() string {
|
||||
if n.IP == nil {
|
||||
n.IP = (*IP6)(big.NewInt(0))
|
||||
}
|
||||
return fmt.Sprintf("%s/%d", n.IP.String(), n.PrefixLen)
|
||||
}
|
||||
|
||||
func (n IP6Net) StringSep(hexSep, prefixSep string) string {
|
||||
return fmt.Sprintf("%s%s%d", n.IP.String(), prefixSep, n.PrefixLen)
|
||||
}
|
||||
|
||||
func (n IP6Net) Network() IP6Net {
|
||||
mask := net.CIDRMask(int(n.PrefixLen), 128)
|
||||
return IP6Net{
|
||||
FromIP6(n.IP.ToIP().Mask(mask)),
|
||||
n.PrefixLen,
|
||||
}
|
||||
}
|
||||
|
||||
func (n IP6Net) Next() IP6Net {
|
||||
return IP6Net{
|
||||
(*IP6)(big.NewInt(0).Add((*big.Int)(n.IP), big.NewInt(0).Lsh(big.NewInt(1), 128-n.PrefixLen))),
|
||||
n.PrefixLen,
|
||||
}
|
||||
}
|
||||
|
||||
// IncrementIP() increments the IP of IP6Net CIDR by 1
|
||||
func (n *IP6Net) IncrementIP() {
|
||||
n.IP = (*IP6)(big.NewInt(0).Add((*big.Int)(n.IP), big.NewInt(1)))
|
||||
}
|
||||
|
||||
func FromIP6Net(n *net.IPNet) IP6Net {
|
||||
prefixLen, _ := n.Mask.Size()
|
||||
return IP6Net{
|
||||
FromIP6(n.IP),
|
||||
uint(prefixLen),
|
||||
}
|
||||
}
|
||||
|
||||
func (n IP6Net) ToIPNet() *net.IPNet {
|
||||
return &net.IPNet{
|
||||
IP: n.IP.ToIP(),
|
||||
Mask: net.CIDRMask(int(n.PrefixLen), 128),
|
||||
}
|
||||
}
|
||||
|
||||
func (n IP6Net) Overlaps(other IP6Net) bool {
|
||||
var mask *big.Int
|
||||
if n.PrefixLen < other.PrefixLen {
|
||||
mask = n.Mask()
|
||||
} else {
|
||||
mask = other.Mask()
|
||||
}
|
||||
return (IP6)(*big.NewInt(0).And((*big.Int)(n.IP), mask)).String() ==
|
||||
(IP6)(*big.NewInt(0).And((*big.Int)(other.IP), mask)).String()
|
||||
}
|
||||
|
||||
func (n IP6Net) Equal(other IP6Net) bool {
|
||||
return ((*big.Int)(n.IP).Cmp((*big.Int)(other.IP)) == 0) &&
|
||||
n.PrefixLen == other.PrefixLen
|
||||
}
|
||||
|
||||
func (n IP6Net) Mask() *big.Int {
|
||||
mask := net.CIDRMask(int(n.PrefixLen), 128)
|
||||
return big.NewInt(0).SetBytes(mask)
|
||||
}
|
||||
|
||||
func (n IP6Net) Contains(ip *IP6) bool {
|
||||
network := big.NewInt(0).And((*big.Int)(n.IP), n.Mask())
|
||||
subnet := big.NewInt(0).And((*big.Int)(ip), n.Mask())
|
||||
return (IP6)(*network).String() == (IP6)(*subnet).String()
|
||||
}
|
||||
|
||||
func (n IP6Net) Empty() bool {
|
||||
return n.IP == (*IP6)(big.NewInt(0)) && n.PrefixLen == uint(0)
|
||||
}
|
||||
|
||||
// MarshalJSON: json.Marshaler impl
|
||||
func (n IP6Net) MarshalJSON() ([]byte, error) {
|
||||
return []byte(fmt.Sprintf(`"%s"`, n)), nil
|
||||
}
|
||||
|
||||
// UnmarshalJSON: json.Unmarshaler impl
|
||||
func (n *IP6Net) UnmarshalJSON(j []byte) error {
|
||||
j = bytes.Trim(j, "\"")
|
||||
if _, val, err := net.ParseCIDR(string(j)); err != nil {
|
||||
return err
|
||||
} else {
|
||||
*n = FromIP6Net(val)
|
||||
return nil
|
||||
}
|
||||
}
|
5
vendor/github.com/flannel-io/flannel/pkg/ip/ipnet.go
generated
vendored
5
vendor/github.com/flannel-io/flannel/pkg/ip/ipnet.go
generated
vendored
@ -127,6 +127,11 @@ func (n IP4Net) Next() IP4Net {
|
||||
}
|
||||
}
|
||||
|
||||
// IncrementIP() increments the IP of IP4Net CIDR by 1
|
||||
func (n *IP4Net) IncrementIP() {
|
||||
n.IP++
|
||||
}
|
||||
|
||||
func FromIPNet(n *net.IPNet) IP4Net {
|
||||
prefixLen, _ := n.Mask.Size()
|
||||
return IP4Net{
|
||||
|
35
vendor/github.com/flannel-io/flannel/pkg/mac/mac.go
generated
vendored
Normal file
35
vendor/github.com/flannel-io/flannel/pkg/mac/mac.go
generated
vendored
Normal file
@ -0,0 +1,35 @@
|
||||
// Copyright 2021 flannel authors
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
package mac
|
||||
|
||||
import (
|
||||
"crypto/rand"
|
||||
"fmt"
|
||||
"net"
|
||||
)
|
||||
|
||||
// NewHardwareAddr generates a new random hardware (MAC) address, local and
|
||||
// unicast.
|
||||
func NewHardwareAddr() (net.HardwareAddr, error) {
|
||||
hardwareAddr := make(net.HardwareAddr, 6)
|
||||
if _, err := rand.Read(hardwareAddr); err != nil {
|
||||
return nil, fmt.Errorf("could not generate random MAC address: %w", err)
|
||||
}
|
||||
|
||||
// Ensure that address is locally administered and unicast.
|
||||
hardwareAddr[0] = (hardwareAddr[0] & 0xfe) | 0x02
|
||||
|
||||
return hardwareAddr, nil
|
||||
}
|
170
vendor/github.com/flannel-io/flannel/subnet/config.go
generated
vendored
170
vendor/github.com/flannel-io/flannel/subnet/config.go
generated
vendored
@ -18,17 +18,24 @@ import (
|
||||
"encoding/json"
|
||||
"errors"
|
||||
"fmt"
|
||||
"math/big"
|
||||
|
||||
"github.com/flannel-io/flannel/pkg/ip"
|
||||
)
|
||||
|
||||
type Config struct {
|
||||
Network ip.IP4Net
|
||||
SubnetMin ip.IP4
|
||||
SubnetMax ip.IP4
|
||||
SubnetLen uint
|
||||
BackendType string `json:"-"`
|
||||
Backend json.RawMessage `json:",omitempty"`
|
||||
EnableIPv4 bool
|
||||
EnableIPv6 bool
|
||||
Network ip.IP4Net
|
||||
IPv6Network ip.IP6Net
|
||||
SubnetMin ip.IP4
|
||||
SubnetMax ip.IP4
|
||||
IPv6SubnetMin *ip.IP6
|
||||
IPv6SubnetMax *ip.IP6
|
||||
SubnetLen uint
|
||||
IPv6SubnetLen uint
|
||||
BackendType string `json:"-"`
|
||||
Backend json.RawMessage `json:",omitempty"`
|
||||
}
|
||||
|
||||
func parseBackendType(be json.RawMessage) (string, error) {
|
||||
@ -47,65 +54,126 @@ func parseBackendType(be json.RawMessage) (string, error) {
|
||||
|
||||
func ParseConfig(s string) (*Config, error) {
|
||||
cfg := new(Config)
|
||||
// Enable ipv4 by default
|
||||
cfg.EnableIPv4 = true
|
||||
err := json.Unmarshal([]byte(s), cfg)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
if cfg.SubnetLen > 0 {
|
||||
// SubnetLen needs to allow for a tunnel and bridge device on each host.
|
||||
if cfg.SubnetLen > 30 {
|
||||
return nil, errors.New("SubnetLen must be less than /31")
|
||||
}
|
||||
if cfg.EnableIPv4 {
|
||||
if cfg.SubnetLen > 0 {
|
||||
// SubnetLen needs to allow for a tunnel and bridge device on each host.
|
||||
if cfg.SubnetLen > 30 {
|
||||
return nil, errors.New("SubnetLen must be less than /31")
|
||||
}
|
||||
|
||||
// SubnetLen needs to fit _more_ than twice into the Network.
|
||||
// the first subnet isn't used, so splitting into two one only provide one usable host.
|
||||
if cfg.SubnetLen < cfg.Network.PrefixLen+2 {
|
||||
return nil, errors.New("Network must be able to accommodate at least four subnets")
|
||||
}
|
||||
} else {
|
||||
// If the network is smaller than a /28 then the network isn't big enough for flannel so return an error.
|
||||
// Default to giving each host at least a /24 (as long as the network is big enough to support at least four hosts)
|
||||
// Otherwise, if the network is too small to give each host a /24 just split the network into four.
|
||||
if cfg.Network.PrefixLen > 28 {
|
||||
// Each subnet needs at least four addresses (/30) and the network needs to accommodate at least four
|
||||
// since the first subnet isn't used, so splitting into two would only provide one usable host.
|
||||
// So the min useful PrefixLen is /28
|
||||
return nil, errors.New("Network is too small. Minimum useful network prefix is /28")
|
||||
} else if cfg.Network.PrefixLen <= 22 {
|
||||
// Network is big enough to give each host a /24
|
||||
cfg.SubnetLen = 24
|
||||
// SubnetLen needs to fit _more_ than twice into the Network.
|
||||
// the first subnet isn't used, so splitting into two one only provide one usable host.
|
||||
if cfg.SubnetLen < cfg.Network.PrefixLen+2 {
|
||||
return nil, errors.New("Network must be able to accommodate at least four subnets")
|
||||
}
|
||||
} else {
|
||||
// Use +2 to provide four hosts per subnet.
|
||||
cfg.SubnetLen = cfg.Network.PrefixLen + 2
|
||||
// If the network is smaller than a /28 then the network isn't big enough for flannel so return an error.
|
||||
// Default to giving each host at least a /24 (as long as the network is big enough to support at least four hosts)
|
||||
// Otherwise, if the network is too small to give each host a /24 just split the network into four.
|
||||
if cfg.Network.PrefixLen > 28 {
|
||||
// Each subnet needs at least four addresses (/30) and the network needs to accommodate at least four
|
||||
// since the first subnet isn't used, so splitting into two would only provide one usable host.
|
||||
// So the min useful PrefixLen is /28
|
||||
return nil, errors.New("Network is too small. Minimum useful network prefix is /28")
|
||||
} else if cfg.Network.PrefixLen <= 22 {
|
||||
// Network is big enough to give each host a /24
|
||||
cfg.SubnetLen = 24
|
||||
} else {
|
||||
// Use +2 to provide four hosts per subnet.
|
||||
cfg.SubnetLen = cfg.Network.PrefixLen + 2
|
||||
}
|
||||
}
|
||||
|
||||
subnetSize := ip.IP4(1 << (32 - cfg.SubnetLen))
|
||||
|
||||
if cfg.SubnetMin == ip.IP4(0) {
|
||||
// skip over the first subnet otherwise it causes problems. e.g.
|
||||
// if Network is 10.100.0.0/16, having an interface with 10.0.0.0
|
||||
// conflicts with the broadcast address.
|
||||
cfg.SubnetMin = cfg.Network.IP + subnetSize
|
||||
} else if !cfg.Network.Contains(cfg.SubnetMin) {
|
||||
return nil, errors.New("SubnetMin is not in the range of the Network")
|
||||
}
|
||||
|
||||
if cfg.SubnetMax == ip.IP4(0) {
|
||||
cfg.SubnetMax = cfg.Network.Next().IP - subnetSize
|
||||
} else if !cfg.Network.Contains(cfg.SubnetMax) {
|
||||
return nil, errors.New("SubnetMax is not in the range of the Network")
|
||||
}
|
||||
|
||||
// The SubnetMin and SubnetMax need to be aligned to a SubnetLen boundary
|
||||
mask := ip.IP4(0xFFFFFFFF << (32 - cfg.SubnetLen))
|
||||
if cfg.SubnetMin != cfg.SubnetMin&mask {
|
||||
return nil, fmt.Errorf("SubnetMin is not on a SubnetLen boundary: %v", cfg.SubnetMin)
|
||||
}
|
||||
|
||||
if cfg.SubnetMax != cfg.SubnetMax&mask {
|
||||
return nil, fmt.Errorf("SubnetMax is not on a SubnetLen boundary: %v", cfg.SubnetMax)
|
||||
}
|
||||
}
|
||||
if cfg.EnableIPv6 {
|
||||
if cfg.IPv6SubnetLen > 0 {
|
||||
// SubnetLen needs to allow for a tunnel and bridge device on each host.
|
||||
if cfg.IPv6SubnetLen > 126 {
|
||||
return nil, errors.New("SubnetLen must be less than /127")
|
||||
}
|
||||
|
||||
subnetSize := ip.IP4(1 << (32 - cfg.SubnetLen))
|
||||
// SubnetLen needs to fit _more_ than twice into the Network.
|
||||
// the first subnet isn't used, so splitting into two one only provide one usable host.
|
||||
if cfg.IPv6SubnetLen < cfg.IPv6Network.PrefixLen+2 {
|
||||
return nil, errors.New("Network must be able to accommodate at least four subnets")
|
||||
}
|
||||
} else {
|
||||
// If the network is smaller than a /124 then the network isn't big enough for flannel so return an error.
|
||||
// Default to giving each host at least a /64 (as long as the network is big enough to support at least four hosts)
|
||||
// Otherwise, if the network is too small to give each host a /64 just split the network into four.
|
||||
if cfg.IPv6Network.PrefixLen > 124 {
|
||||
// Each subnet needs at least four addresses (/126) and the network needs to accommodate at least four
|
||||
// since the first subnet isn't used, so splitting into two would only provide one usable host.
|
||||
// So the min useful PrefixLen is /124
|
||||
return nil, errors.New("IPv6Network is too small. Minimum useful network prefix is /124")
|
||||
} else if cfg.IPv6Network.PrefixLen <= 62 {
|
||||
// Network is big enough to give each host a /64
|
||||
cfg.IPv6SubnetLen = 64
|
||||
} else {
|
||||
// Use +2 to provide four hosts per subnet.
|
||||
cfg.IPv6SubnetLen = cfg.IPv6Network.PrefixLen + 2
|
||||
}
|
||||
}
|
||||
|
||||
if cfg.SubnetMin == ip.IP4(0) {
|
||||
// skip over the first subnet otherwise it causes problems. e.g.
|
||||
// if Network is 10.100.0.0/16, having an interface with 10.0.0.0
|
||||
// conflicts with the broadcast address.
|
||||
cfg.SubnetMin = cfg.Network.IP + subnetSize
|
||||
} else if !cfg.Network.Contains(cfg.SubnetMin) {
|
||||
return nil, errors.New("SubnetMin is not in the range of the Network")
|
||||
}
|
||||
ipv6SubnetSize := big.NewInt(0).Lsh(big.NewInt(1), 128-cfg.IPv6SubnetLen)
|
||||
|
||||
if cfg.SubnetMax == ip.IP4(0) {
|
||||
cfg.SubnetMax = cfg.Network.Next().IP - subnetSize
|
||||
} else if !cfg.Network.Contains(cfg.SubnetMax) {
|
||||
return nil, errors.New("SubnetMax is not in the range of the Network")
|
||||
}
|
||||
if ip.IsEmpty(cfg.IPv6SubnetMin) {
|
||||
// skip over the first subnet otherwise it causes problems. e.g.
|
||||
// if Network is fc00::/48, having an interface with fc00::
|
||||
// conflicts with the broadcast address.
|
||||
cfg.IPv6SubnetMin = ip.GetIPv6SubnetMin(cfg.IPv6Network.IP, ipv6SubnetSize)
|
||||
} else if !cfg.IPv6Network.Contains(cfg.IPv6SubnetMin) {
|
||||
return nil, errors.New("IPv6SubnetMin is not in the range of the IPv6Network")
|
||||
}
|
||||
|
||||
// The SubnetMin and SubnetMax need to be aligned to a SubnetLen boundary
|
||||
mask := ip.IP4(0xFFFFFFFF << (32 - cfg.SubnetLen))
|
||||
if cfg.SubnetMin != cfg.SubnetMin&mask {
|
||||
return nil, fmt.Errorf("SubnetMin is not on a SubnetLen boundary: %v", cfg.SubnetMin)
|
||||
}
|
||||
if ip.IsEmpty(cfg.IPv6SubnetMax) {
|
||||
cfg.IPv6SubnetMax = ip.GetIPv6SubnetMax(cfg.IPv6Network.Next().IP, ipv6SubnetSize)
|
||||
} else if !cfg.IPv6Network.Contains(cfg.IPv6SubnetMax) {
|
||||
return nil, errors.New("IPv6SubnetMax is not in the range of the IPv6Network")
|
||||
}
|
||||
|
||||
if cfg.SubnetMax != cfg.SubnetMax&mask {
|
||||
return nil, fmt.Errorf("SubnetMax is not on a SubnetLen boundary: %v", cfg.SubnetMax)
|
||||
// The SubnetMin and SubnetMax need to be aligned to a SubnetLen boundary
|
||||
mask := ip.Mask(int(cfg.IPv6SubnetLen))
|
||||
if !ip.CheckIPv6Subnet(cfg.IPv6SubnetMin, mask) {
|
||||
return nil, fmt.Errorf("IPv6SubnetMin is not on a SubnetLen boundary: %v", cfg.IPv6SubnetMin)
|
||||
}
|
||||
|
||||
if !ip.CheckIPv6Subnet(cfg.IPv6SubnetMax, mask) {
|
||||
return nil, fmt.Errorf("IPv6SubnetMax is not on a SubnetLen boundary: %v", cfg.IPv6SubnetMax)
|
||||
}
|
||||
}
|
||||
|
||||
bt, err := parseBackendType(cfg.Backend)
|
||||
|
26
vendor/github.com/flannel-io/flannel/subnet/kube/annotations.go
generated
vendored
26
vendor/github.com/flannel-io/flannel/subnet/kube/annotations.go
generated
vendored
@ -21,11 +21,14 @@ import (
|
||||
)
|
||||
|
||||
type annotations struct {
|
||||
SubnetKubeManaged string
|
||||
BackendData string
|
||||
BackendType string
|
||||
BackendPublicIP string
|
||||
BackendPublicIPOverwrite string
|
||||
SubnetKubeManaged string
|
||||
BackendData string
|
||||
BackendV6Data string
|
||||
BackendType string
|
||||
BackendPublicIP string
|
||||
BackendPublicIPv6 string
|
||||
BackendPublicIPOverwrite string
|
||||
BackendPublicIPv6Overwrite string
|
||||
}
|
||||
|
||||
func newAnnotations(prefix string) (annotations, error) {
|
||||
@ -55,11 +58,14 @@ func newAnnotations(prefix string) (annotations, error) {
|
||||
}
|
||||
|
||||
a := annotations{
|
||||
SubnetKubeManaged: prefix + "kube-subnet-manager",
|
||||
BackendData: prefix + "backend-data",
|
||||
BackendType: prefix + "backend-type",
|
||||
BackendPublicIP: prefix + "public-ip",
|
||||
BackendPublicIPOverwrite: prefix + "public-ip-overwrite",
|
||||
SubnetKubeManaged: prefix + "kube-subnet-manager",
|
||||
BackendData: prefix + "backend-data",
|
||||
BackendV6Data: prefix + "backend-v6-data",
|
||||
BackendType: prefix + "backend-type",
|
||||
BackendPublicIP: prefix + "public-ip",
|
||||
BackendPublicIPOverwrite: prefix + "public-ip-overwrite",
|
||||
BackendPublicIPv6: prefix + "public-ipv6",
|
||||
BackendPublicIPv6Overwrite: prefix + "public-ipv6-overwrite",
|
||||
}
|
||||
|
||||
return a, nil
|
||||
|
180
vendor/github.com/flannel-io/flannel/subnet/kube/kube.go
generated
vendored
180
vendor/github.com/flannel-io/flannel/subnet/kube/kube.go
generated
vendored
@ -51,16 +51,19 @@ const (
|
||||
)
|
||||
|
||||
type kubeSubnetManager struct {
|
||||
annotations annotations
|
||||
client clientset.Interface
|
||||
nodeName string
|
||||
nodeStore listers.NodeLister
|
||||
nodeController cache.Controller
|
||||
subnetConf *subnet.Config
|
||||
events chan subnet.Event
|
||||
enableIPv4 bool
|
||||
enableIPv6 bool
|
||||
annotations annotations
|
||||
client clientset.Interface
|
||||
nodeName string
|
||||
nodeStore listers.NodeLister
|
||||
nodeController cache.Controller
|
||||
subnetConf *subnet.Config
|
||||
events chan subnet.Event
|
||||
setNodeNetworkUnavailable bool
|
||||
}
|
||||
|
||||
func NewSubnetManager(ctx context.Context, apiUrl, kubeconfig, prefix, netConfPath string) (subnet.Manager, error) {
|
||||
func NewSubnetManager(ctx context.Context, apiUrl, kubeconfig, prefix, netConfPath string, setNodeNetworkUnavailable bool) (subnet.Manager, error) {
|
||||
var cfg *rest.Config
|
||||
var err error
|
||||
// Try to build kubernetes config from a master url or a kubeconfig filepath. If neither masterUrl
|
||||
@ -111,6 +114,7 @@ func NewSubnetManager(ctx context.Context, apiUrl, kubeconfig, prefix, netConfPa
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("error creating network manager: %s", err)
|
||||
}
|
||||
sm.setNodeNetworkUnavailable = setNodeNetworkUnavailable
|
||||
go sm.Run(context.Background())
|
||||
|
||||
log.Infof("Waiting %s for node controller to sync", nodeControllerSyncTimeout)
|
||||
@ -132,6 +136,8 @@ func newKubeSubnetManager(ctx context.Context, c clientset.Interface, sc *subnet
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
ksm.enableIPv4 = sc.EnableIPv4
|
||||
ksm.enableIPv6 = sc.EnableIPv6
|
||||
ksm.client = c
|
||||
ksm.nodeName = nodeName
|
||||
ksm.subnetConf = sc
|
||||
@ -198,9 +204,20 @@ func (ksm *kubeSubnetManager) handleUpdateLeaseEvent(oldObj, newObj interface{})
|
||||
if s, ok := n.Annotations[ksm.annotations.SubnetKubeManaged]; !ok || s != "true" {
|
||||
return
|
||||
}
|
||||
if o.Annotations[ksm.annotations.BackendData] == n.Annotations[ksm.annotations.BackendData] &&
|
||||
var changed = true
|
||||
if ksm.enableIPv4 && o.Annotations[ksm.annotations.BackendData] == n.Annotations[ksm.annotations.BackendData] &&
|
||||
o.Annotations[ksm.annotations.BackendType] == n.Annotations[ksm.annotations.BackendType] &&
|
||||
o.Annotations[ksm.annotations.BackendPublicIP] == n.Annotations[ksm.annotations.BackendPublicIP] {
|
||||
changed = false
|
||||
}
|
||||
|
||||
if ksm.enableIPv6 && o.Annotations[ksm.annotations.BackendV6Data] == n.Annotations[ksm.annotations.BackendV6Data] &&
|
||||
o.Annotations[ksm.annotations.BackendType] == n.Annotations[ksm.annotations.BackendType] &&
|
||||
o.Annotations[ksm.annotations.BackendPublicIPv6] == n.Annotations[ksm.annotations.BackendPublicIPv6] {
|
||||
changed = false
|
||||
}
|
||||
|
||||
if !changed {
|
||||
return // No change to lease
|
||||
}
|
||||
|
||||
@ -226,30 +243,75 @@ func (ksm *kubeSubnetManager) AcquireLease(ctx context.Context, attrs *subnet.Le
|
||||
if n.Spec.PodCIDR == "" {
|
||||
return nil, fmt.Errorf("node %q pod cidr not assigned", ksm.nodeName)
|
||||
}
|
||||
bd, err := attrs.BackendData.MarshalJSON()
|
||||
|
||||
var bd, v6Bd []byte
|
||||
bd, err = attrs.BackendData.MarshalJSON()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
_, cidr, err := net.ParseCIDR(n.Spec.PodCIDR)
|
||||
|
||||
v6Bd, err = attrs.BackendV6Data.MarshalJSON()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if n.Annotations[ksm.annotations.BackendData] != string(bd) ||
|
||||
|
||||
var cidr, ipv6Cidr *net.IPNet
|
||||
_, cidr, err = net.ParseCIDR(n.Spec.PodCIDR)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
for _, podCidr := range n.Spec.PodCIDRs {
|
||||
_, parseCidr, err := net.ParseCIDR(podCidr)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if len(parseCidr.IP) == net.IPv6len {
|
||||
ipv6Cidr = parseCidr
|
||||
break
|
||||
}
|
||||
}
|
||||
|
||||
if (n.Annotations[ksm.annotations.BackendData] != string(bd) ||
|
||||
n.Annotations[ksm.annotations.BackendType] != attrs.BackendType ||
|
||||
n.Annotations[ksm.annotations.BackendPublicIP] != attrs.PublicIP.String() ||
|
||||
n.Annotations[ksm.annotations.SubnetKubeManaged] != "true" ||
|
||||
(n.Annotations[ksm.annotations.BackendPublicIPOverwrite] != "" && n.Annotations[ksm.annotations.BackendPublicIPOverwrite] != attrs.PublicIP.String()) {
|
||||
(n.Annotations[ksm.annotations.BackendPublicIPOverwrite] != "" && n.Annotations[ksm.annotations.BackendPublicIPOverwrite] != attrs.PublicIP.String())) ||
|
||||
(attrs.PublicIPv6 != nil &&
|
||||
(n.Annotations[ksm.annotations.BackendV6Data] != string(v6Bd) ||
|
||||
n.Annotations[ksm.annotations.BackendType] != attrs.BackendType ||
|
||||
n.Annotations[ksm.annotations.BackendPublicIPv6] != attrs.PublicIPv6.String() ||
|
||||
n.Annotations[ksm.annotations.SubnetKubeManaged] != "true" ||
|
||||
(n.Annotations[ksm.annotations.BackendPublicIPv6Overwrite] != "" && n.Annotations[ksm.annotations.BackendPublicIPv6Overwrite] != attrs.PublicIPv6.String()))) {
|
||||
n.Annotations[ksm.annotations.BackendType] = attrs.BackendType
|
||||
n.Annotations[ksm.annotations.BackendData] = string(bd)
|
||||
if n.Annotations[ksm.annotations.BackendPublicIPOverwrite] != "" {
|
||||
if n.Annotations[ksm.annotations.BackendPublicIP] != n.Annotations[ksm.annotations.BackendPublicIPOverwrite] {
|
||||
log.Infof("Overriding public ip with '%s' from node annotation '%s'",
|
||||
n.Annotations[ksm.annotations.BackendPublicIPOverwrite],
|
||||
ksm.annotations.BackendPublicIPOverwrite)
|
||||
n.Annotations[ksm.annotations.BackendPublicIP] = n.Annotations[ksm.annotations.BackendPublicIPOverwrite]
|
||||
|
||||
//TODO -i only vxlan and host-gw backends support dual stack now.
|
||||
if (attrs.BackendType == "vxlan" && string(bd) != "null") || attrs.BackendType != "vxlan" {
|
||||
n.Annotations[ksm.annotations.BackendData] = string(bd)
|
||||
if n.Annotations[ksm.annotations.BackendPublicIPOverwrite] != "" {
|
||||
if n.Annotations[ksm.annotations.BackendPublicIP] != n.Annotations[ksm.annotations.BackendPublicIPOverwrite] {
|
||||
log.Infof("Overriding public ip with '%s' from node annotation '%s'",
|
||||
n.Annotations[ksm.annotations.BackendPublicIPOverwrite],
|
||||
ksm.annotations.BackendPublicIPOverwrite)
|
||||
n.Annotations[ksm.annotations.BackendPublicIP] = n.Annotations[ksm.annotations.BackendPublicIPOverwrite]
|
||||
}
|
||||
} else {
|
||||
n.Annotations[ksm.annotations.BackendPublicIP] = attrs.PublicIP.String()
|
||||
}
|
||||
}
|
||||
|
||||
if (attrs.BackendType == "vxlan" && string(v6Bd) != "null") || (attrs.BackendType == "host-gw" && attrs.PublicIPv6 != nil) {
|
||||
n.Annotations[ksm.annotations.BackendV6Data] = string(v6Bd)
|
||||
if n.Annotations[ksm.annotations.BackendPublicIPv6Overwrite] != "" {
|
||||
if n.Annotations[ksm.annotations.BackendPublicIPv6] != n.Annotations[ksm.annotations.BackendPublicIPv6Overwrite] {
|
||||
log.Infof("Overriding public ipv6 with '%s' from node annotation '%s'",
|
||||
n.Annotations[ksm.annotations.BackendPublicIPv6Overwrite],
|
||||
ksm.annotations.BackendPublicIPv6Overwrite)
|
||||
n.Annotations[ksm.annotations.BackendPublicIPv6] = n.Annotations[ksm.annotations.BackendPublicIPv6Overwrite]
|
||||
}
|
||||
} else {
|
||||
n.Annotations[ksm.annotations.BackendPublicIPv6] = attrs.PublicIPv6.String()
|
||||
}
|
||||
} else {
|
||||
n.Annotations[ksm.annotations.BackendPublicIP] = attrs.PublicIP.String()
|
||||
}
|
||||
n.Annotations[ksm.annotations.SubnetKubeManaged] = "true"
|
||||
|
||||
@ -273,15 +335,32 @@ func (ksm *kubeSubnetManager) AcquireLease(ctx context.Context, attrs *subnet.Le
|
||||
return nil, err
|
||||
}
|
||||
}
|
||||
err = ksm.setNodeNetworkUnavailableFalse(ctx)
|
||||
if err != nil {
|
||||
log.Errorf("Unable to set NetworkUnavailable to False for %q: %v", ksm.nodeName, err)
|
||||
if ksm.setNodeNetworkUnavailable {
|
||||
log.Infoln("Setting NodeNetworkUnavailable")
|
||||
err = ksm.setNodeNetworkUnavailableFalse(ctx)
|
||||
if err != nil {
|
||||
log.Errorf("Unable to set NodeNetworkUnavailable to False for %q: %v", ksm.nodeName, err)
|
||||
}
|
||||
} else {
|
||||
log.Infoln("Skip setting NodeNetworkUnavailable")
|
||||
}
|
||||
return &subnet.Lease{
|
||||
Subnet: ip.FromIPNet(cidr),
|
||||
|
||||
lease := &subnet.Lease{
|
||||
Attrs: *attrs,
|
||||
Expiration: time.Now().Add(24 * time.Hour),
|
||||
}, nil
|
||||
}
|
||||
if cidr != nil {
|
||||
lease.Subnet = ip.FromIPNet(cidr)
|
||||
}
|
||||
if ipv6Cidr != nil {
|
||||
lease.IPv6Subnet = ip.FromIP6Net(ipv6Cidr)
|
||||
}
|
||||
//TODO - only vxlan and host-gw backends support dual stack now.
|
||||
if attrs.BackendType != "vxlan" && attrs.BackendType != "host-gw" {
|
||||
lease.EnableIPv4 = true
|
||||
lease.EnableIPv6 = false
|
||||
}
|
||||
return lease, nil
|
||||
}
|
||||
|
||||
func (ksm *kubeSubnetManager) WatchLeases(ctx context.Context, cursor interface{}) (subnet.LeaseWatchResult, error) {
|
||||
@ -301,20 +380,43 @@ func (ksm *kubeSubnetManager) Run(ctx context.Context) {
|
||||
}
|
||||
|
||||
func (ksm *kubeSubnetManager) nodeToLease(n v1.Node) (l subnet.Lease, err error) {
|
||||
l.Attrs.PublicIP, err = ip.ParseIP4(n.Annotations[ksm.annotations.BackendPublicIP])
|
||||
if err != nil {
|
||||
return l, err
|
||||
if ksm.enableIPv4 {
|
||||
l.Attrs.PublicIP, err = ip.ParseIP4(n.Annotations[ksm.annotations.BackendPublicIP])
|
||||
if err != nil {
|
||||
return l, err
|
||||
}
|
||||
l.Attrs.BackendData = json.RawMessage(n.Annotations[ksm.annotations.BackendData])
|
||||
|
||||
_, cidr, err := net.ParseCIDR(n.Spec.PodCIDR)
|
||||
if err != nil {
|
||||
return l, err
|
||||
}
|
||||
l.Subnet = ip.FromIPNet(cidr)
|
||||
l.EnableIPv4 = ksm.enableIPv4
|
||||
}
|
||||
|
||||
if ksm.enableIPv6 {
|
||||
l.Attrs.PublicIPv6, err = ip.ParseIP6(n.Annotations[ksm.annotations.BackendPublicIPv6])
|
||||
if err != nil {
|
||||
return l, err
|
||||
}
|
||||
l.Attrs.BackendV6Data = json.RawMessage(n.Annotations[ksm.annotations.BackendV6Data])
|
||||
|
||||
ipv6Cidr := new(net.IPNet)
|
||||
for _, podCidr := range n.Spec.PodCIDRs {
|
||||
_, parseCidr, err := net.ParseCIDR(podCidr)
|
||||
if err != nil {
|
||||
return l, err
|
||||
}
|
||||
if len(parseCidr.IP) == net.IPv6len {
|
||||
ipv6Cidr = parseCidr
|
||||
break
|
||||
}
|
||||
}
|
||||
l.IPv6Subnet = ip.FromIP6Net(ipv6Cidr)
|
||||
l.EnableIPv6 = ksm.enableIPv6
|
||||
}
|
||||
l.Attrs.BackendType = n.Annotations[ksm.annotations.BackendType]
|
||||
l.Attrs.BackendData = json.RawMessage(n.Annotations[ksm.annotations.BackendData])
|
||||
|
||||
_, cidr, err := net.ParseCIDR(n.Spec.PodCIDR)
|
||||
if err != nil {
|
||||
return l, err
|
||||
}
|
||||
|
||||
l.Subnet = ip.FromIPNet(cidr)
|
||||
return l, nil
|
||||
}
|
||||
|
||||
|
11
vendor/github.com/flannel-io/flannel/subnet/subnet.go
generated
vendored
11
vendor/github.com/flannel-io/flannel/subnet/subnet.go
generated
vendored
@ -34,13 +34,18 @@ var (
|
||||
)
|
||||
|
||||
type LeaseAttrs struct {
|
||||
PublicIP ip.IP4
|
||||
BackendType string `json:",omitempty"`
|
||||
BackendData json.RawMessage `json:",omitempty"`
|
||||
PublicIP ip.IP4
|
||||
PublicIPv6 *ip.IP6
|
||||
BackendType string `json:",omitempty"`
|
||||
BackendData json.RawMessage `json:",omitempty"`
|
||||
BackendV6Data json.RawMessage `json:",omitempty"`
|
||||
}
|
||||
|
||||
type Lease struct {
|
||||
EnableIPv4 bool
|
||||
EnableIPv6 bool
|
||||
Subnet ip.IP4Net
|
||||
IPv6Subnet ip.IP6Net
|
||||
Attrs LeaseAttrs
|
||||
Expiration time.Time
|
||||
|
||||
|
90
vendor/github.com/flannel-io/flannel/subnet/watch.go
generated
vendored
90
vendor/github.com/flannel-io/flannel/subnet/watch.go
generated
vendored
@ -17,9 +17,8 @@ package subnet
|
||||
import (
|
||||
"time"
|
||||
|
||||
"golang.org/x/net/context"
|
||||
|
||||
"github.com/flannel-io/flannel/pkg/ip"
|
||||
"golang.org/x/net/context"
|
||||
log "k8s.io/klog"
|
||||
)
|
||||
|
||||
@ -76,13 +75,39 @@ func (lw *leaseWatcher) reset(leases []Lease) []Event {
|
||||
batch := []Event{}
|
||||
|
||||
for _, nl := range leases {
|
||||
if lw.ownLease != nil && nl.Subnet.Equal(lw.ownLease.Subnet) {
|
||||
if lw.ownLease != nil && nl.EnableIPv4 && !nl.EnableIPv6 &&
|
||||
nl.Subnet.Equal(lw.ownLease.Subnet) {
|
||||
continue
|
||||
} else if lw.ownLease != nil && !nl.EnableIPv4 && nl.EnableIPv6 &&
|
||||
nl.IPv6Subnet.Equal(lw.ownLease.IPv6Subnet) {
|
||||
continue
|
||||
} else if lw.ownLease != nil && nl.EnableIPv4 && nl.EnableIPv6 &&
|
||||
nl.Subnet.Equal(lw.ownLease.Subnet) &&
|
||||
nl.IPv6Subnet.Equal(lw.ownLease.IPv6Subnet) {
|
||||
continue
|
||||
} else if lw.ownLease != nil && !nl.EnableIPv4 && !nl.EnableIPv6 &&
|
||||
nl.Subnet.Equal(lw.ownLease.Subnet) {
|
||||
//TODO - dual-stack temporarily only compatible with kube subnet manager
|
||||
continue
|
||||
}
|
||||
|
||||
found := false
|
||||
for i, ol := range lw.leases {
|
||||
if ol.Subnet.Equal(nl.Subnet) {
|
||||
if ol.EnableIPv4 && !ol.EnableIPv6 && ol.Subnet.Equal(nl.Subnet) {
|
||||
lw.leases = deleteLease(lw.leases, i)
|
||||
found = true
|
||||
break
|
||||
} else if ol.EnableIPv4 && !ol.EnableIPv6 && ol.IPv6Subnet.Equal(nl.IPv6Subnet) {
|
||||
lw.leases = deleteLease(lw.leases, i)
|
||||
found = true
|
||||
break
|
||||
} else if ol.EnableIPv4 && ol.EnableIPv6 && ol.Subnet.Equal(nl.Subnet) &&
|
||||
ol.IPv6Subnet.Equal(nl.IPv6Subnet) {
|
||||
lw.leases = deleteLease(lw.leases, i)
|
||||
found = true
|
||||
break
|
||||
} else if !ol.EnableIPv4 && !ol.EnableIPv6 && ol.Subnet.Equal(nl.Subnet) {
|
||||
//TODO - dual-stack temporarily only compatible with kube subnet manager
|
||||
lw.leases = deleteLease(lw.leases, i)
|
||||
found = true
|
||||
break
|
||||
@ -97,7 +122,19 @@ func (lw *leaseWatcher) reset(leases []Lease) []Event {
|
||||
|
||||
// everything left in sm.leases has been deleted
|
||||
for _, l := range lw.leases {
|
||||
if lw.ownLease != nil && l.Subnet.Equal(lw.ownLease.Subnet) {
|
||||
if lw.ownLease != nil && l.EnableIPv4 && !l.EnableIPv6 &&
|
||||
l.Subnet.Equal(lw.ownLease.Subnet) {
|
||||
continue
|
||||
} else if lw.ownLease != nil && !l.EnableIPv4 && l.EnableIPv6 &&
|
||||
l.IPv6Subnet.Equal(lw.ownLease.IPv6Subnet) {
|
||||
continue
|
||||
} else if lw.ownLease != nil && l.EnableIPv4 && l.EnableIPv6 &&
|
||||
l.Subnet.Equal(lw.ownLease.Subnet) &&
|
||||
l.IPv6Subnet.Equal(lw.ownLease.IPv6Subnet) {
|
||||
continue
|
||||
} else if lw.ownLease != nil && !l.EnableIPv4 && !l.EnableIPv6 &&
|
||||
l.Subnet.Equal(lw.ownLease.Subnet) {
|
||||
//TODO - dual-stack temporarily only compatible with kube subnet manager
|
||||
continue
|
||||
}
|
||||
batch = append(batch, Event{EventRemoved, l})
|
||||
@ -114,7 +151,19 @@ func (lw *leaseWatcher) update(events []Event) []Event {
|
||||
batch := []Event{}
|
||||
|
||||
for _, e := range events {
|
||||
if lw.ownLease != nil && e.Lease.Subnet.Equal(lw.ownLease.Subnet) {
|
||||
if lw.ownLease != nil && e.Lease.EnableIPv4 && !e.Lease.EnableIPv6 &&
|
||||
e.Lease.Subnet.Equal(lw.ownLease.Subnet) {
|
||||
continue
|
||||
} else if lw.ownLease != nil && !e.Lease.EnableIPv4 && e.Lease.EnableIPv6 &&
|
||||
e.Lease.IPv6Subnet.Equal(lw.ownLease.IPv6Subnet) {
|
||||
continue
|
||||
} else if lw.ownLease != nil && e.Lease.EnableIPv4 && e.Lease.EnableIPv6 &&
|
||||
e.Lease.Subnet.Equal(lw.ownLease.Subnet) &&
|
||||
e.Lease.IPv6Subnet.Equal(lw.ownLease.IPv6Subnet) {
|
||||
continue
|
||||
} else if lw.ownLease != nil && !e.Lease.EnableIPv4 && !e.Lease.EnableIPv6 &&
|
||||
e.Lease.Subnet.Equal(lw.ownLease.Subnet) {
|
||||
//TODO - dual-stack temporarily only compatible with kube subnet manager
|
||||
continue
|
||||
}
|
||||
|
||||
@ -132,12 +181,22 @@ func (lw *leaseWatcher) update(events []Event) []Event {
|
||||
|
||||
func (lw *leaseWatcher) add(lease *Lease) Event {
|
||||
for i, l := range lw.leases {
|
||||
if l.Subnet.Equal(lease.Subnet) {
|
||||
if l.EnableIPv4 && !l.EnableIPv6 && l.Subnet.Equal(lease.Subnet) {
|
||||
lw.leases[i] = *lease
|
||||
return Event{EventAdded, lw.leases[i]}
|
||||
} else if !l.EnableIPv4 && l.EnableIPv6 && l.IPv6Subnet.Equal(lease.IPv6Subnet) {
|
||||
lw.leases[i] = *lease
|
||||
return Event{EventAdded, lw.leases[i]}
|
||||
} else if l.EnableIPv4 && l.EnableIPv6 && l.Subnet.Equal(lease.Subnet) &&
|
||||
l.IPv6Subnet.Equal(lease.IPv6Subnet) {
|
||||
lw.leases[i] = *lease
|
||||
return Event{EventAdded, lw.leases[i]}
|
||||
} else if !l.EnableIPv4 && !l.EnableIPv6 && l.Subnet.Equal(lease.Subnet) {
|
||||
//TODO - dual-stack temporarily only compatible with kube subnet manager
|
||||
lw.leases[i] = *lease
|
||||
return Event{EventAdded, lw.leases[i]}
|
||||
}
|
||||
}
|
||||
|
||||
lw.leases = append(lw.leases, *lease)
|
||||
|
||||
return Event{EventAdded, lw.leases[len(lw.leases)-1]}
|
||||
@ -145,13 +204,24 @@ func (lw *leaseWatcher) add(lease *Lease) Event {
|
||||
|
||||
func (lw *leaseWatcher) remove(lease *Lease) Event {
|
||||
for i, l := range lw.leases {
|
||||
if l.Subnet.Equal(lease.Subnet) {
|
||||
if l.EnableIPv4 && !l.EnableIPv6 && l.Subnet.Equal(lease.Subnet) {
|
||||
lw.leases = deleteLease(lw.leases, i)
|
||||
return Event{EventRemoved, l}
|
||||
} else if !l.EnableIPv4 && l.EnableIPv6 && l.IPv6Subnet.Equal(lease.IPv6Subnet) {
|
||||
lw.leases = deleteLease(lw.leases, i)
|
||||
return Event{EventRemoved, l}
|
||||
} else if l.EnableIPv4 && l.EnableIPv6 && l.Subnet.Equal(lease.Subnet) &&
|
||||
l.IPv6Subnet.Equal(lease.IPv6Subnet) {
|
||||
lw.leases = deleteLease(lw.leases, i)
|
||||
return Event{EventRemoved, l}
|
||||
} else if !l.EnableIPv4 && !l.EnableIPv6 && l.Subnet.Equal(lease.Subnet) {
|
||||
//TODO - dual-stack temporarily only compatible with kube subnet manager
|
||||
lw.leases = deleteLease(lw.leases, i)
|
||||
return Event{EventRemoved, l}
|
||||
}
|
||||
}
|
||||
|
||||
log.Errorf("Removed subnet (%s) was not found", lease.Subnet)
|
||||
log.Errorf("Removed subnet (%s) and ipv6 subnet (%s) were not found", lease.Subnet, lease.IPv6Subnet)
|
||||
return Event{EventRemoved, *lease}
|
||||
}
|
||||
|
||||
|
6
vendor/modules.txt
vendored
6
vendor/modules.txt
vendored
@ -141,8 +141,7 @@ github.com/beorn7/perks/quantile
|
||||
github.com/bits-and-blooms/bitset
|
||||
# github.com/blang/semver v3.5.1+incompatible
|
||||
github.com/blang/semver
|
||||
# github.com/bronze1man/goStrongswanVici v0.0.0-20190828090544-27d02f80ba40
|
||||
## explicit
|
||||
# github.com/bronze1man/goStrongswanVici v0.0.0-20201105010758-936f38b697fd
|
||||
github.com/bronze1man/goStrongswanVici
|
||||
# github.com/canonical/go-dqlite v1.5.1
|
||||
github.com/canonical/go-dqlite
|
||||
@ -491,7 +490,7 @@ github.com/evanphx/json-patch
|
||||
github.com/exponent-io/jsonpath
|
||||
# github.com/fatih/camelcase v1.0.0
|
||||
github.com/fatih/camelcase
|
||||
# github.com/flannel-io/flannel v0.14.0
|
||||
# github.com/flannel-io/flannel v0.15.1
|
||||
## explicit
|
||||
github.com/flannel-io/flannel/backend
|
||||
github.com/flannel-io/flannel/backend/extension
|
||||
@ -500,6 +499,7 @@ github.com/flannel-io/flannel/backend/ipsec
|
||||
github.com/flannel-io/flannel/backend/vxlan
|
||||
github.com/flannel-io/flannel/network
|
||||
github.com/flannel-io/flannel/pkg/ip
|
||||
github.com/flannel-io/flannel/pkg/mac
|
||||
github.com/flannel-io/flannel/pkg/powershell
|
||||
github.com/flannel-io/flannel/pkg/routing
|
||||
github.com/flannel-io/flannel/subnet
|
||||
|
Loading…
Reference in New Issue
Block a user