-
Notifications
You must be signed in to change notification settings - Fork 389
/
Copy pathip_assigner_linux.go
224 lines (204 loc) · 7.34 KB
/
ip_assigner_linux.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
// Copyright 2021 Antrea Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package ipassigner
import (
"errors"
"fmt"
"net"
"sync"
"github.com/vishvananda/netlink"
"golang.org/x/sys/unix"
"k8s.io/apimachinery/pkg/util/sets"
"k8s.io/klog/v2"
utilnet "k8s.io/utils/net"
"antrea.io/antrea/pkg/agent/ipassigner/responder"
"antrea.io/antrea/pkg/agent/util"
)
// ipAssigner creates a dummy device and assigns IPs to it.
// It's supposed to be used in the cases that external IPs should be configured on the system so that they can be used
// for SNAT (egress scenario) or DNAT (ingress scenario). A dummy device is used because the IPs just need to be present
// in any device to be functional, and using dummy device avoids touching system managed devices and is easy to know IPs
// that are assigned by antrea-agent.
type ipAssigner struct {
// externalInterface is the device that GARP (IPv4) and Unsolicited NA (IPv6) will be sent from.
externalInterface *net.Interface
// dummyDevice is the device that IPs will be assigned to.
dummyDevice netlink.Link
// assignIPs caches the IPs that are assigned to the dummy device.
// TODO: Add a goroutine to ensure that the cache is in sync with the IPs assigned to the dummy device in case the
// IPs are removed by users accidentally.
assignedIPs sets.String
mutex sync.RWMutex
arpResponder responder.Responder
ndpResponder responder.Responder
}
// NewIPAssigner returns an *ipAssigner.
func NewIPAssigner(nodeTransportInterface string, dummyDeviceName string) (*ipAssigner, error) {
ipv4, ipv6, externalInterface, err := util.GetIPNetDeviceByName(nodeTransportInterface)
if err != nil {
return nil, fmt.Errorf("get IPNetDevice from name %s error: %+v", nodeTransportInterface, err)
}
a := &ipAssigner{
externalInterface: externalInterface,
assignedIPs: sets.NewString(),
}
if ipv4 != nil {
arpResonder, err := responder.NewARPResponder(externalInterface)
if err != nil {
return nil, fmt.Errorf("failed to create ARP responder for link %s: %v", externalInterface.Name, err)
}
a.arpResponder = arpResonder
}
if ipv6 != nil {
ndpResponder, err := responder.NewNDPResponder(externalInterface)
if err != nil {
return nil, fmt.Errorf("failed to create NDP responder for link %s: %v", externalInterface.Name, err)
}
a.ndpResponder = ndpResponder
}
if dummyDeviceName != "" {
dummyDevice, err := ensureDummyDevice(dummyDeviceName)
if err != nil {
return nil, fmt.Errorf("error when ensuring dummy device exists: %v", err)
}
a.dummyDevice = dummyDevice
if err := a.loadIPAddresses(); err != nil {
return nil, fmt.Errorf("error when loading IP addresses from the system: %v", err)
}
}
return a, nil
}
// ensureDummyDevice creates the dummy device if it doesn't exist.
func ensureDummyDevice(deviceName string) (netlink.Link, error) {
link, err := netlink.LinkByName(deviceName)
if err == nil {
return link, nil
}
dummy := &netlink.Dummy{
LinkAttrs: netlink.LinkAttrs{Name: deviceName},
}
if err = netlink.LinkAdd(dummy); err != nil {
return nil, err
}
return dummy, nil
}
// loadIPAddresses gets the IP addresses on the dummy device and caches them in memory.
func (a *ipAssigner) loadIPAddresses() error {
addresses, err := netlink.AddrList(a.dummyDevice, netlink.FAMILY_ALL)
if err != nil {
return err
}
newAssignIPs := sets.NewString()
for _, address := range addresses {
newAssignIPs.Insert(address.IP.String())
}
a.mutex.Lock()
defer a.mutex.Unlock()
a.assignedIPs = newAssignIPs
return nil
}
// AssignIP ensures the provided IP is assigned to the dummy device and the ARP/NDP responders.
func (a *ipAssigner) AssignIP(ip string) error {
parsedIP := net.ParseIP(ip)
if parsedIP == nil {
return fmt.Errorf("invalid IP %s", ip)
}
a.mutex.Lock()
defer a.mutex.Unlock()
if a.assignedIPs.Has(ip) {
klog.V(2).InfoS("The IP is already assigned", "ip", ip)
return nil
}
if a.dummyDevice != nil {
addr := util.NewIPNet(parsedIP)
if err := netlink.AddrAdd(a.dummyDevice, &netlink.Addr{IPNet: addr}); err != nil {
if !errors.Is(err, unix.EEXIST) {
return fmt.Errorf("failed to add IP %v to interface %s: %v", ip, a.dummyDevice.Attrs().Name, err)
} else {
klog.InfoS("IP was already assigned to interface", "ip", parsedIP, "interface", a.dummyDevice.Attrs().Name)
}
} else {
klog.InfoS("Assigned IP to interface", "ip", parsedIP, "interface", a.dummyDevice.Attrs().Name)
}
}
if utilnet.IsIPv4(parsedIP) && a.arpResponder != nil {
if err := a.arpResponder.AddIP(parsedIP); err != nil {
return fmt.Errorf("failed to assign IP %v to ARP responder: %v", ip, err)
}
}
if utilnet.IsIPv6(parsedIP) && a.ndpResponder != nil {
if err := a.ndpResponder.AddIP(parsedIP); err != nil {
return fmt.Errorf("failed to assign IP %v to NDP responder: %v", ip, err)
}
}
a.assignedIPs.Insert(ip)
return nil
}
// UnassignIP ensures the provided IP is not assigned to the dummy device.
func (a *ipAssigner) UnassignIP(ip string) error {
parsedIP := net.ParseIP(ip)
if parsedIP == nil {
return fmt.Errorf("invalid IP %s", ip)
}
a.mutex.Lock()
defer a.mutex.Unlock()
if !a.assignedIPs.Has(ip) {
klog.V(2).InfoS("The IP is not assigned", "ip", ip)
return nil
}
if a.dummyDevice != nil {
addr := util.NewIPNet(parsedIP)
if err := netlink.AddrDel(a.dummyDevice, &netlink.Addr{IPNet: addr}); err != nil {
if !errors.Is(err, unix.EADDRNOTAVAIL) {
return fmt.Errorf("failed to delete IP %v from interface %s: %v", ip, a.dummyDevice.Attrs().Name, err)
} else {
klog.InfoS("IP does not exist on interface", "ip", parsedIP, "interface", a.dummyDevice.Attrs().Name)
}
}
klog.InfoS("Deleted IP from interface", "ip", ip, "interface", a.dummyDevice.Attrs().Name)
}
if utilnet.IsIPv4(parsedIP) && a.arpResponder != nil {
if err := a.arpResponder.RemoveIP(parsedIP); err != nil {
return fmt.Errorf("failed to remove IP %v from ARP responder: %v", ip, err)
}
}
if utilnet.IsIPv6(parsedIP) && a.ndpResponder != nil {
if err := a.ndpResponder.RemoveIP(parsedIP); err != nil {
return fmt.Errorf("failed to remove IP %v from NDP responder: %v", ip, err)
}
}
a.assignedIPs.Delete(ip)
return nil
}
// AssignedIPs return the IPs that are assigned to the dummy device.
func (a *ipAssigner) AssignedIPs() sets.String {
a.mutex.RLock()
defer a.mutex.RUnlock()
// Return a copy.
return a.assignedIPs.Union(nil)
}
// Run starts the ARP responder and NDP responder.
func (a *ipAssigner) Run(ch <-chan struct{}) {
// Start the ARP responder only when the dummy device is not created. The kernel will handle ARP requests
// for IPs assigned to the dummy devices by default.
// TODO: Check the arp_ignore sysctl parameter of the transport interface to determine whether to start
// the ARP responder or not.
if a.dummyDevice == nil && a.arpResponder != nil {
go a.arpResponder.Run(ch)
}
if a.ndpResponder != nil {
go a.ndpResponder.Run(ch)
}
<-ch
}