2014-06-06 23:40:48 +00:00
|
|
|
/*
|
2015-05-01 16:19:44 +00:00
|
|
|
Copyright 2014 The Kubernetes Authors All rights reserved.
|
2014-06-06 23:40:48 +00:00
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package proxy
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"net"
|
2014-07-30 13:52:03 +00:00
|
|
|
"strconv"
|
2014-09-10 20:44:20 +00:00
|
|
|
"strings"
|
2014-07-30 13:52:03 +00:00
|
|
|
"sync"
|
2015-02-03 22:37:41 +00:00
|
|
|
"sync/atomic"
|
2014-06-06 23:40:48 +00:00
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/api"
|
2015-02-18 19:30:18 +00:00
|
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/types"
|
2014-07-30 13:52:03 +00:00
|
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/util"
|
2015-01-09 06:10:03 +00:00
|
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/util/errors"
|
2014-09-18 23:03:34 +00:00
|
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/util/iptables"
|
2014-06-25 03:51:57 +00:00
|
|
|
"github.com/golang/glog"
|
2014-06-06 23:40:48 +00:00
|
|
|
)
|
|
|
|
|
2014-07-30 13:52:03 +00:00
|
|
|
type serviceInfo struct {
|
2015-03-13 15:16:41 +00:00
|
|
|
portalIP net.IP
|
|
|
|
portalPort int
|
|
|
|
protocol api.Protocol
|
|
|
|
proxyPort int
|
|
|
|
socket proxySocket
|
|
|
|
timeout time.Duration
|
|
|
|
publicIPs []string // TODO: make this net.IP
|
2014-12-18 23:46:10 +00:00
|
|
|
sessionAffinityType api.AffinityType
|
|
|
|
stickyMaxAgeMinutes int
|
2014-09-11 23:08:25 +00:00
|
|
|
}
|
|
|
|
|
2014-09-11 16:00:06 +00:00
|
|
|
func logTimeout(err error) bool {
|
|
|
|
if e, ok := err.(net.Error); ok {
|
|
|
|
if e.Timeout() {
|
2015-02-03 22:37:41 +00:00
|
|
|
glog.V(3).Infof("connection to endpoint closed due to inactivity")
|
2014-09-11 16:00:06 +00:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2014-08-03 19:23:15 +00:00
|
|
|
// Proxier is a simple proxy for TCP connections between a localhost:lport
|
|
|
|
// and services that provide the actual implementations.
|
2014-06-06 23:40:48 +00:00
|
|
|
type Proxier struct {
|
2015-02-03 22:37:41 +00:00
|
|
|
loadBalancer LoadBalancer
|
|
|
|
mu sync.Mutex // protects serviceMap
|
2015-03-13 15:16:41 +00:00
|
|
|
serviceMap map[ServicePortName]*serviceInfo
|
2015-02-03 22:37:41 +00:00
|
|
|
numProxyLoops int32 // use atomic ops to access this; mostly for testing
|
|
|
|
listenIP net.IP
|
|
|
|
iptables iptables.Interface
|
|
|
|
hostIP net.IP
|
2014-06-06 23:40:48 +00:00
|
|
|
}
|
|
|
|
|
2015-05-14 20:03:30 +00:00
|
|
|
var (
|
|
|
|
// ErrProxyOnLocalhost is returned by NewProxier if the user requests a proxier on
|
|
|
|
// the loopback address. May be checked for by callers of NewProxier to know whether
|
|
|
|
// the caller provided invalid input.
|
|
|
|
ErrProxyOnLocalhost = fmt.Errorf("cannot proxy on localhost")
|
|
|
|
)
|
|
|
|
|
|
|
|
// IsProxyLocked returns true if the proxy could not acquire the lock on iptables.
|
|
|
|
func IsProxyLocked(err error) bool {
|
|
|
|
return strings.Contains(err.Error(), "holding the xtables lock")
|
|
|
|
}
|
|
|
|
|
2014-09-18 23:03:34 +00:00
|
|
|
// NewProxier returns a new Proxier given a LoadBalancer and an address on
|
|
|
|
// which to listen. Because of the iptables logic, It is assumed that there
|
2015-05-14 20:03:30 +00:00
|
|
|
// is only a single Proxier active on a machine. An error will be returned if
|
|
|
|
// the proxier cannot be started due to an invalid ListenIP (loopback) or
|
|
|
|
// if iptables fails to update or acquire the initial lock. Once a proxier is
|
|
|
|
// created, it will keep iptables up to date in the background and will not
|
|
|
|
// terminate if a particular iptables call fails.
|
|
|
|
func NewProxier(loadBalancer LoadBalancer, listenIP net.IP, iptables iptables.Interface) (*Proxier, error) {
|
2014-11-28 07:54:55 +00:00
|
|
|
if listenIP.Equal(localhostIPv4) || listenIP.Equal(localhostIPv6) {
|
2015-05-14 20:03:30 +00:00
|
|
|
return nil, ErrProxyOnLocalhost
|
2014-11-28 07:54:55 +00:00
|
|
|
}
|
|
|
|
|
2015-02-26 20:15:50 +00:00
|
|
|
hostIP, err := util.ChooseHostInterface()
|
2014-11-28 07:54:55 +00:00
|
|
|
if err != nil {
|
2015-05-14 20:03:30 +00:00
|
|
|
return nil, fmt.Errorf("failed to select a host interface: %v", err)
|
2014-11-28 07:54:55 +00:00
|
|
|
}
|
2015-05-14 20:03:30 +00:00
|
|
|
|
|
|
|
glog.V(2).Infof("Setting proxy IP to %v and initializing iptables", hostIP)
|
2015-05-14 18:37:25 +00:00
|
|
|
return createProxier(loadBalancer, listenIP, iptables, hostIP)
|
2015-03-12 20:10:48 +00:00
|
|
|
}
|
|
|
|
|
2015-05-14 20:03:30 +00:00
|
|
|
func createProxier(loadBalancer LoadBalancer, listenIP net.IP, iptables iptables.Interface, hostIP net.IP) (*Proxier, error) {
|
2014-11-28 07:54:55 +00:00
|
|
|
// Clean up old messes. Ignore erors.
|
|
|
|
iptablesDeleteOld(iptables)
|
2014-09-18 23:03:34 +00:00
|
|
|
// Set up the iptables foundations we need.
|
|
|
|
if err := iptablesInit(iptables); err != nil {
|
2015-05-14 20:03:30 +00:00
|
|
|
return nil, fmt.Errorf("failed to initialize iptables: %v", err)
|
2014-09-18 23:03:34 +00:00
|
|
|
}
|
|
|
|
// Flush old iptables rules (since the bound ports will be invalid after a restart).
|
|
|
|
// When OnUpdate() is first called, the rules will be recreated.
|
|
|
|
if err := iptablesFlush(iptables); err != nil {
|
2015-05-14 20:03:30 +00:00
|
|
|
return nil, fmt.Errorf("failed to flush iptables: %v", err)
|
2014-09-18 23:03:34 +00:00
|
|
|
}
|
2014-08-03 19:23:15 +00:00
|
|
|
return &Proxier{
|
2014-11-28 07:54:55 +00:00
|
|
|
loadBalancer: loadBalancer,
|
2015-03-13 15:16:41 +00:00
|
|
|
serviceMap: make(map[ServicePortName]*serviceInfo),
|
2014-11-28 07:54:55 +00:00
|
|
|
listenIP: listenIP,
|
|
|
|
iptables: iptables,
|
|
|
|
hostIP: hostIP,
|
2015-05-14 20:03:30 +00:00
|
|
|
}, nil
|
2014-09-18 23:03:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// The periodic interval for checking the state of things.
|
|
|
|
const syncInterval = 5 * time.Second
|
|
|
|
|
|
|
|
// SyncLoop runs periodic work. This is expected to run as a goroutine or as the main loop of the app. It does not return.
|
|
|
|
func (proxier *Proxier) SyncLoop() {
|
2015-05-04 21:29:33 +00:00
|
|
|
t := time.NewTicker(syncInterval)
|
|
|
|
defer t.Stop()
|
2014-09-18 23:03:34 +00:00
|
|
|
for {
|
2015-05-04 21:29:33 +00:00
|
|
|
<-t.C
|
2015-05-14 20:03:30 +00:00
|
|
|
glog.V(6).Infof("Periodic sync")
|
2015-05-04 21:29:33 +00:00
|
|
|
if err := iptablesInit(proxier.iptables); err != nil {
|
|
|
|
glog.Errorf("Failed to ensure iptables: %v", err)
|
2014-09-18 23:03:34 +00:00
|
|
|
}
|
2015-05-04 21:29:33 +00:00
|
|
|
proxier.ensurePortals()
|
|
|
|
proxier.cleanupStaleStickySessions()
|
2014-09-18 23:03:34 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure that portals exist for all services.
|
|
|
|
func (proxier *Proxier) ensurePortals() {
|
|
|
|
proxier.mu.Lock()
|
|
|
|
defer proxier.mu.Unlock()
|
|
|
|
// NB: This does not remove rules that should not be present.
|
|
|
|
for name, info := range proxier.serviceMap {
|
|
|
|
err := proxier.openPortal(name, info)
|
|
|
|
if err != nil {
|
2014-11-20 10:00:36 +00:00
|
|
|
glog.Errorf("Failed to ensure portal for %q: %v", name, err)
|
2014-09-18 23:03:34 +00:00
|
|
|
}
|
2014-08-03 19:23:15 +00:00
|
|
|
}
|
2014-06-06 23:40:48 +00:00
|
|
|
}
|
|
|
|
|
2014-12-18 23:46:10 +00:00
|
|
|
// clean up any stale sticky session records in the hash map.
|
|
|
|
func (proxier *Proxier) cleanupStaleStickySessions() {
|
2015-03-13 15:16:41 +00:00
|
|
|
for name := range proxier.serviceMap {
|
|
|
|
proxier.loadBalancer.CleanupStaleStickySessions(name)
|
2014-12-18 23:46:10 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-09-20 18:29:04 +00:00
|
|
|
// This assumes proxier.mu is not locked.
|
2015-03-13 15:16:41 +00:00
|
|
|
func (proxier *Proxier) stopProxy(service ServicePortName, info *serviceInfo) error {
|
2014-09-20 18:29:04 +00:00
|
|
|
proxier.mu.Lock()
|
|
|
|
defer proxier.mu.Unlock()
|
2014-09-17 00:04:23 +00:00
|
|
|
return proxier.stopProxyInternal(service, info)
|
2014-07-30 13:52:03 +00:00
|
|
|
}
|
|
|
|
|
2014-09-20 18:29:04 +00:00
|
|
|
// This assumes proxier.mu is locked.
|
2015-03-13 15:16:41 +00:00
|
|
|
func (proxier *Proxier) stopProxyInternal(service ServicePortName, info *serviceInfo) error {
|
2014-09-20 18:29:04 +00:00
|
|
|
delete(proxier.serviceMap, service)
|
2014-09-10 20:44:20 +00:00
|
|
|
return info.socket.Close()
|
2014-07-30 13:52:03 +00:00
|
|
|
}
|
|
|
|
|
2015-03-13 15:16:41 +00:00
|
|
|
func (proxier *Proxier) getServiceInfo(service ServicePortName) (*serviceInfo, bool) {
|
2014-08-03 19:23:15 +00:00
|
|
|
proxier.mu.Lock()
|
|
|
|
defer proxier.mu.Unlock()
|
2014-07-30 13:52:03 +00:00
|
|
|
info, ok := proxier.serviceMap[service]
|
|
|
|
return info, ok
|
|
|
|
}
|
|
|
|
|
2015-03-13 15:16:41 +00:00
|
|
|
func (proxier *Proxier) setServiceInfo(service ServicePortName, info *serviceInfo) {
|
2014-08-03 19:23:15 +00:00
|
|
|
proxier.mu.Lock()
|
|
|
|
defer proxier.mu.Unlock()
|
2014-07-30 13:52:03 +00:00
|
|
|
proxier.serviceMap[service] = info
|
|
|
|
}
|
|
|
|
|
2014-09-18 23:03:34 +00:00
|
|
|
// addServiceOnPort starts listening for a new service, returning the serviceInfo.
|
|
|
|
// Pass proxyPort=0 to allocate a random port. The timeout only applies to UDP
|
2014-09-11 16:50:20 +00:00
|
|
|
// connections, for now.
|
2015-03-13 15:16:41 +00:00
|
|
|
func (proxier *Proxier) addServiceOnPort(service ServicePortName, protocol api.Protocol, proxyPort int, timeout time.Duration) (*serviceInfo, error) {
|
2014-11-28 07:54:55 +00:00
|
|
|
sock, err := newProxySocket(protocol, proxier.listenIP, proxyPort)
|
2014-06-13 00:18:19 +00:00
|
|
|
if err != nil {
|
2014-09-18 23:03:34 +00:00
|
|
|
return nil, err
|
2014-06-13 00:18:19 +00:00
|
|
|
}
|
2014-09-18 23:03:34 +00:00
|
|
|
_, portStr, err := net.SplitHostPort(sock.Addr().String())
|
2014-07-30 13:52:03 +00:00
|
|
|
if err != nil {
|
2014-09-18 23:03:34 +00:00
|
|
|
sock.Close()
|
|
|
|
return nil, err
|
2014-07-30 13:52:03 +00:00
|
|
|
}
|
2014-09-18 23:03:34 +00:00
|
|
|
portNum, err := strconv.Atoi(portStr)
|
2014-07-30 13:52:03 +00:00
|
|
|
if err != nil {
|
2014-09-18 23:03:34 +00:00
|
|
|
sock.Close()
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
si := &serviceInfo{
|
2014-12-18 23:46:10 +00:00
|
|
|
proxyPort: portNum,
|
|
|
|
protocol: protocol,
|
|
|
|
socket: sock,
|
|
|
|
timeout: timeout,
|
2015-03-13 15:16:41 +00:00
|
|
|
sessionAffinityType: api.AffinityTypeNone, // default
|
|
|
|
stickyMaxAgeMinutes: 180, // TODO: paramaterize this in the API.
|
2014-07-30 13:52:03 +00:00
|
|
|
}
|
2014-09-18 23:03:34 +00:00
|
|
|
proxier.setServiceInfo(service, si)
|
|
|
|
|
2015-05-14 20:03:30 +00:00
|
|
|
glog.V(2).Infof("Proxying for service %q on %s port %d", service, protocol, portNum)
|
2015-03-13 15:16:41 +00:00
|
|
|
go func(service ServicePortName, proxier *Proxier) {
|
2014-09-11 23:21:00 +00:00
|
|
|
defer util.HandleCrash()
|
2015-02-03 22:37:41 +00:00
|
|
|
atomic.AddInt32(&proxier.numProxyLoops, 1)
|
|
|
|
sock.ProxyLoop(service, si, proxier)
|
|
|
|
atomic.AddInt32(&proxier.numProxyLoops, -1)
|
2014-12-01 23:16:53 +00:00
|
|
|
}(service, proxier)
|
2014-09-18 23:03:34 +00:00
|
|
|
|
|
|
|
return si, nil
|
2014-06-13 00:18:19 +00:00
|
|
|
}
|
|
|
|
|
2014-09-11 16:50:20 +00:00
|
|
|
// How long we leave idle UDP connections open.
|
2015-04-12 06:51:08 +00:00
|
|
|
const udpIdleTimeout = 10 * time.Second
|
2014-09-11 16:50:20 +00:00
|
|
|
|
2014-08-03 19:23:15 +00:00
|
|
|
// OnUpdate manages the active set of service proxies.
|
|
|
|
// Active service proxies are reinitialized if found in the update set or
|
|
|
|
// shutdown if missing from the update set.
|
2014-08-05 19:34:54 +00:00
|
|
|
func (proxier *Proxier) OnUpdate(services []api.Service) {
|
2014-09-18 10:46:14 +00:00
|
|
|
glog.V(4).Infof("Received update notice: %+v", services)
|
2015-03-13 15:16:41 +00:00
|
|
|
activeServices := make(map[ServicePortName]bool) // use a map as a set
|
|
|
|
for i := range services {
|
|
|
|
service := &services[i]
|
|
|
|
|
2015-03-16 21:36:30 +00:00
|
|
|
// if PortalIP is "None" or empty, skip proxying
|
2015-03-13 15:16:41 +00:00
|
|
|
if !api.IsServiceIPSet(service) {
|
|
|
|
glog.V(3).Infof("Skipping service %s due to portal IP = %q", types.NamespacedName{service.Namespace, service.Name}, service.Spec.PortalIP)
|
2015-03-16 21:36:30 +00:00
|
|
|
continue
|
|
|
|
}
|
2015-03-13 15:16:41 +00:00
|
|
|
|
|
|
|
for i := range service.Spec.Ports {
|
|
|
|
servicePort := &service.Spec.Ports[i]
|
|
|
|
|
|
|
|
serviceName := ServicePortName{types.NamespacedName{service.Namespace, service.Name}, servicePort.Name}
|
|
|
|
activeServices[serviceName] = true
|
|
|
|
serviceIP := net.ParseIP(service.Spec.PortalIP)
|
|
|
|
info, exists := proxier.getServiceInfo(serviceName)
|
|
|
|
// TODO: check health of the socket? What if ProxyLoop exited?
|
|
|
|
if exists && sameConfig(info, service, servicePort) {
|
|
|
|
// Nothing changed.
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if exists {
|
|
|
|
glog.V(4).Infof("Something changed for service %q: stopping it", serviceName)
|
|
|
|
err := proxier.closePortal(serviceName, info)
|
|
|
|
if err != nil {
|
|
|
|
glog.Errorf("Failed to close portal for %q: %v", serviceName, err)
|
|
|
|
}
|
|
|
|
err = proxier.stopProxy(serviceName, info)
|
|
|
|
if err != nil {
|
|
|
|
glog.Errorf("Failed to stop service %q: %v", serviceName, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
glog.V(1).Infof("Adding new service %q at %s:%d/%s", serviceName, serviceIP, servicePort.Port, servicePort.Protocol)
|
|
|
|
info, err := proxier.addServiceOnPort(serviceName, servicePort.Protocol, 0, udpIdleTimeout)
|
2014-09-18 23:03:34 +00:00
|
|
|
if err != nil {
|
2015-03-13 15:16:41 +00:00
|
|
|
glog.Errorf("Failed to start proxy for %q: %v", serviceName, err)
|
|
|
|
continue
|
2014-09-18 23:03:34 +00:00
|
|
|
}
|
2015-03-13 15:16:41 +00:00
|
|
|
info.portalIP = serviceIP
|
|
|
|
info.portalPort = servicePort.Port
|
|
|
|
info.publicIPs = service.Spec.PublicIPs
|
|
|
|
info.sessionAffinityType = service.Spec.SessionAffinity
|
|
|
|
glog.V(4).Infof("info: %+v", info)
|
|
|
|
|
|
|
|
err = proxier.openPortal(serviceName, info)
|
2014-09-11 16:00:06 +00:00
|
|
|
if err != nil {
|
2015-03-13 15:16:41 +00:00
|
|
|
glog.Errorf("Failed to open portal for %q: %v", serviceName, err)
|
2014-09-11 16:00:06 +00:00
|
|
|
}
|
2015-03-13 15:16:41 +00:00
|
|
|
proxier.loadBalancer.NewService(serviceName, info.sessionAffinityType, info.stickyMaxAgeMinutes)
|
2014-07-30 13:52:03 +00:00
|
|
|
}
|
|
|
|
}
|
2014-08-03 19:23:15 +00:00
|
|
|
proxier.mu.Lock()
|
|
|
|
defer proxier.mu.Unlock()
|
2014-07-30 13:52:03 +00:00
|
|
|
for name, info := range proxier.serviceMap {
|
2015-02-18 19:30:18 +00:00
|
|
|
if !activeServices[name] {
|
2014-09-18 23:03:34 +00:00
|
|
|
glog.V(1).Infof("Stopping service %q", name)
|
|
|
|
err := proxier.closePortal(name, info)
|
|
|
|
if err != nil {
|
2014-11-20 10:00:36 +00:00
|
|
|
glog.Errorf("Failed to close portal for %q: %v", name, err)
|
2014-09-18 23:03:34 +00:00
|
|
|
}
|
|
|
|
err = proxier.stopProxyInternal(name, info)
|
2014-09-11 16:00:06 +00:00
|
|
|
if err != nil {
|
2014-11-20 10:00:36 +00:00
|
|
|
glog.Errorf("Failed to stop service %q: %v", name, err)
|
2014-09-11 16:00:06 +00:00
|
|
|
}
|
2014-07-30 13:52:03 +00:00
|
|
|
}
|
2014-06-06 23:40:48 +00:00
|
|
|
}
|
|
|
|
}
|
2014-09-18 23:03:34 +00:00
|
|
|
|
2015-03-13 15:16:41 +00:00
|
|
|
func sameConfig(info *serviceInfo, service *api.Service, port *api.ServicePort) bool {
|
|
|
|
if info.protocol != port.Protocol || info.portalPort != port.Port {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if !info.portalIP.Equal(net.ParseIP(service.Spec.PortalIP)) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if !ipsEqual(info.publicIPs, service.Spec.PublicIPs) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if info.sessionAffinityType != service.Spec.SessionAffinity {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2014-11-26 18:54:28 +00:00
|
|
|
func ipsEqual(lhs, rhs []string) bool {
|
|
|
|
if len(lhs) != len(rhs) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
for i := range lhs {
|
|
|
|
if lhs[i] != rhs[i] {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2015-03-13 15:16:41 +00:00
|
|
|
func (proxier *Proxier) openPortal(service ServicePortName, info *serviceInfo) error {
|
2014-11-28 07:54:55 +00:00
|
|
|
err := proxier.openOnePortal(info.portalIP, info.portalPort, info.protocol, proxier.listenIP, info.proxyPort, service)
|
2014-09-18 23:03:34 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-03-13 15:16:41 +00:00
|
|
|
for _, publicIP := range info.publicIPs {
|
2014-11-28 07:54:55 +00:00
|
|
|
err = proxier.openOnePortal(net.ParseIP(publicIP), info.portalPort, info.protocol, proxier.listenIP, info.proxyPort, service)
|
2014-11-12 04:08:33 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2014-09-18 23:03:34 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-03-13 15:16:41 +00:00
|
|
|
func (proxier *Proxier) openOnePortal(portalIP net.IP, portalPort int, protocol api.Protocol, proxyIP net.IP, proxyPort int, name ServicePortName) error {
|
2014-11-28 07:54:55 +00:00
|
|
|
// Handle traffic from containers.
|
|
|
|
args := proxier.iptablesContainerPortalArgs(portalIP, portalPort, protocol, proxyIP, proxyPort, name)
|
|
|
|
existed, err := proxier.iptables.EnsureRule(iptables.TableNAT, iptablesContainerPortalChain, args...)
|
|
|
|
if err != nil {
|
|
|
|
glog.Errorf("Failed to install iptables %s rule for service %q", iptablesContainerPortalChain, name)
|
2014-09-18 23:03:34 +00:00
|
|
|
return err
|
|
|
|
}
|
2014-11-28 07:54:55 +00:00
|
|
|
if !existed {
|
2015-05-14 20:03:30 +00:00
|
|
|
glog.V(3).Infof("Opened iptables from-containers portal for service %q on %s %s:%d", name, protocol, portalIP, portalPort)
|
2014-11-28 07:54:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Handle traffic from the host.
|
|
|
|
args = proxier.iptablesHostPortalArgs(portalIP, portalPort, protocol, proxyIP, proxyPort, name)
|
|
|
|
existed, err = proxier.iptables.EnsureRule(iptables.TableNAT, iptablesHostPortalChain, args...)
|
|
|
|
if err != nil {
|
|
|
|
glog.Errorf("Failed to install iptables %s rule for service %q", iptablesHostPortalChain, name)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if !existed {
|
2015-05-14 20:03:30 +00:00
|
|
|
glog.V(3).Infof("Opened iptables from-host portal for service %q on %s %s:%d", name, protocol, portalIP, portalPort)
|
2014-11-12 04:08:33 +00:00
|
|
|
}
|
2014-09-18 23:03:34 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-03-13 15:16:41 +00:00
|
|
|
func (proxier *Proxier) closePortal(service ServicePortName, info *serviceInfo) error {
|
2014-11-28 07:54:55 +00:00
|
|
|
// Collect errors and report them all at the end.
|
|
|
|
el := proxier.closeOnePortal(info.portalIP, info.portalPort, info.protocol, proxier.listenIP, info.proxyPort, service)
|
2015-03-13 15:16:41 +00:00
|
|
|
for _, publicIP := range info.publicIPs {
|
2014-11-28 07:54:55 +00:00
|
|
|
el = append(el, proxier.closeOnePortal(net.ParseIP(publicIP), info.portalPort, info.protocol, proxier.listenIP, info.proxyPort, service)...)
|
2014-11-12 04:08:33 +00:00
|
|
|
}
|
2014-11-28 07:54:55 +00:00
|
|
|
if len(el) == 0 {
|
2015-05-14 20:03:30 +00:00
|
|
|
glog.V(3).Infof("Closed iptables portals for service %q", service)
|
2014-11-28 07:54:55 +00:00
|
|
|
} else {
|
|
|
|
glog.Errorf("Some errors closing iptables portals for service %q", service)
|
|
|
|
}
|
2015-01-09 06:10:03 +00:00
|
|
|
return errors.NewAggregate(el)
|
2014-11-28 07:54:55 +00:00
|
|
|
}
|
|
|
|
|
2015-03-13 15:16:41 +00:00
|
|
|
func (proxier *Proxier) closeOnePortal(portalIP net.IP, portalPort int, protocol api.Protocol, proxyIP net.IP, proxyPort int, name ServicePortName) []error {
|
2014-11-28 07:54:55 +00:00
|
|
|
el := []error{}
|
|
|
|
|
|
|
|
// Handle traffic from containers.
|
|
|
|
args := proxier.iptablesContainerPortalArgs(portalIP, portalPort, protocol, proxyIP, proxyPort, name)
|
|
|
|
if err := proxier.iptables.DeleteRule(iptables.TableNAT, iptablesContainerPortalChain, args...); err != nil {
|
|
|
|
glog.Errorf("Failed to delete iptables %s rule for service %q", iptablesContainerPortalChain, name)
|
|
|
|
el = append(el, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Handle traffic from the host.
|
|
|
|
args = proxier.iptablesHostPortalArgs(portalIP, portalPort, protocol, proxyIP, proxyPort, name)
|
|
|
|
if err := proxier.iptables.DeleteRule(iptables.TableNAT, iptablesHostPortalChain, args...); err != nil {
|
|
|
|
glog.Errorf("Failed to delete iptables %s rule for service %q", iptablesHostPortalChain, name)
|
|
|
|
el = append(el, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return el
|
2014-11-12 04:08:33 +00:00
|
|
|
}
|
|
|
|
|
2014-11-28 07:54:55 +00:00
|
|
|
// See comments in the *PortalArgs() functions for some details about why we
|
|
|
|
// use two chains.
|
|
|
|
var iptablesContainerPortalChain iptables.Chain = "KUBE-PORTALS-CONTAINER"
|
|
|
|
var iptablesHostPortalChain iptables.Chain = "KUBE-PORTALS-HOST"
|
|
|
|
var iptablesOldPortalChain iptables.Chain = "KUBE-PROXY"
|
2014-09-18 23:03:34 +00:00
|
|
|
|
|
|
|
// Ensure that the iptables infrastructure we use is set up. This can safely be called periodically.
|
|
|
|
func iptablesInit(ipt iptables.Interface) error {
|
|
|
|
// TODO: There is almost certainly room for optimization here. E.g. If
|
|
|
|
// we knew the portal_net CIDR we could fast-track outbound packets not
|
|
|
|
// destined for a service. There's probably more, help wanted.
|
2014-11-28 07:54:55 +00:00
|
|
|
if _, err := ipt.EnsureChain(iptables.TableNAT, iptablesContainerPortalChain); err != nil {
|
2014-09-18 23:03:34 +00:00
|
|
|
return err
|
|
|
|
}
|
2014-11-28 07:54:55 +00:00
|
|
|
if _, err := ipt.EnsureRule(iptables.TableNAT, iptables.ChainPrerouting, "-j", string(iptablesContainerPortalChain)); err != nil {
|
2014-09-18 23:03:34 +00:00
|
|
|
return err
|
|
|
|
}
|
2014-11-28 07:54:55 +00:00
|
|
|
if _, err := ipt.EnsureChain(iptables.TableNAT, iptablesHostPortalChain); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if _, err := ipt.EnsureRule(iptables.TableNAT, iptables.ChainOutput, "-j", string(iptablesHostPortalChain)); err != nil {
|
2014-09-18 23:03:34 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2014-11-28 07:54:55 +00:00
|
|
|
func iptablesDeleteOld(ipt iptables.Interface) {
|
|
|
|
// DEPRECATED: The iptablesOldPortalChain is from when we had a single chain
|
|
|
|
// for all rules. We'll unilaterally delete it here. We will remove this
|
|
|
|
// code at some future date (before 1.0).
|
|
|
|
ipt.DeleteRule(iptables.TableNAT, iptables.ChainPrerouting, "-j", string(iptablesOldPortalChain))
|
|
|
|
ipt.DeleteRule(iptables.TableNAT, iptables.ChainOutput, "-j", string(iptablesOldPortalChain))
|
|
|
|
ipt.FlushChain(iptables.TableNAT, iptablesOldPortalChain)
|
|
|
|
ipt.DeleteChain(iptables.TableNAT, iptablesOldPortalChain)
|
|
|
|
}
|
|
|
|
|
2014-09-18 23:03:34 +00:00
|
|
|
// Flush all of our custom iptables rules.
|
|
|
|
func iptablesFlush(ipt iptables.Interface) error {
|
2014-11-28 07:54:55 +00:00
|
|
|
el := []error{}
|
|
|
|
if err := ipt.FlushChain(iptables.TableNAT, iptablesContainerPortalChain); err != nil {
|
|
|
|
el = append(el, err)
|
|
|
|
}
|
|
|
|
if err := ipt.FlushChain(iptables.TableNAT, iptablesHostPortalChain); err != nil {
|
|
|
|
el = append(el, err)
|
|
|
|
}
|
|
|
|
if len(el) != 0 {
|
|
|
|
glog.Errorf("Some errors flushing old iptables portals: %v", el)
|
|
|
|
}
|
2015-01-09 06:10:03 +00:00
|
|
|
return errors.NewAggregate(el)
|
2014-09-18 23:03:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Used below.
|
2014-11-03 16:04:42 +00:00
|
|
|
var zeroIPv4 = net.ParseIP("0.0.0.0")
|
|
|
|
var localhostIPv4 = net.ParseIP("127.0.0.1")
|
|
|
|
|
|
|
|
var zeroIPv6 = net.ParseIP("::0")
|
|
|
|
var localhostIPv6 = net.ParseIP("::1")
|
2014-09-18 23:03:34 +00:00
|
|
|
|
2014-11-28 07:54:55 +00:00
|
|
|
// Build a slice of iptables args that are common to from-container and from-host portal rules.
|
2015-03-13 15:16:41 +00:00
|
|
|
func iptablesCommonPortalArgs(destIP net.IP, destPort int, protocol api.Protocol, service ServicePortName) []string {
|
2014-11-26 20:49:59 +00:00
|
|
|
// This list needs to include all fields as they are eventually spit out
|
|
|
|
// by iptables-save. This is because some systems do not support the
|
|
|
|
// 'iptables -C' arg, and so fall back on parsing iptables-save output.
|
|
|
|
// If this does not match, it will not pass the check. For example:
|
|
|
|
// adding the /32 on the destination IP arg is not strictly required,
|
|
|
|
// but causes this list to not match the final iptables-save output.
|
|
|
|
// This is fragile and I hope one day we can stop supporting such old
|
|
|
|
// iptables versions.
|
2014-09-18 23:03:34 +00:00
|
|
|
args := []string{
|
|
|
|
"-m", "comment",
|
2015-02-18 19:30:18 +00:00
|
|
|
"--comment", service.String(),
|
2014-11-06 01:47:17 +00:00
|
|
|
"-p", strings.ToLower(string(protocol)),
|
2014-11-26 20:49:59 +00:00
|
|
|
"-m", strings.ToLower(string(protocol)),
|
|
|
|
"-d", fmt.Sprintf("%s/32", destIP.String()),
|
2014-09-18 23:03:34 +00:00
|
|
|
"--dport", fmt.Sprintf("%d", destPort),
|
|
|
|
}
|
2014-11-28 07:54:55 +00:00
|
|
|
return args
|
|
|
|
}
|
|
|
|
|
|
|
|
// Build a slice of iptables args for a from-container portal rule.
|
2015-03-13 15:16:41 +00:00
|
|
|
func (proxier *Proxier) iptablesContainerPortalArgs(destIP net.IP, destPort int, protocol api.Protocol, proxyIP net.IP, proxyPort int, service ServicePortName) []string {
|
2014-11-28 07:54:55 +00:00
|
|
|
args := iptablesCommonPortalArgs(destIP, destPort, protocol, service)
|
|
|
|
|
|
|
|
// This is tricky.
|
|
|
|
//
|
|
|
|
// If the proxy is bound (see Proxier.listenIP) to 0.0.0.0 ("any
|
|
|
|
// interface") we want to use REDIRECT, which sends traffic to the
|
|
|
|
// "primary address of the incoming interface" which means the container
|
|
|
|
// bridge, if there is one. When the response comes, it comes from that
|
|
|
|
// same interface, so the NAT matches and the response packet is
|
|
|
|
// correct. This matters for UDP, since there is no per-connection port
|
|
|
|
// number.
|
|
|
|
//
|
|
|
|
// The alternative would be to use DNAT, except that it doesn't work
|
|
|
|
// (empirically):
|
|
|
|
// * DNAT to 127.0.0.1 = Packets just disappear - this seems to be a
|
|
|
|
// well-known limitation of iptables.
|
|
|
|
// * DNAT to eth0's IP = Response packets come from the bridge, which
|
|
|
|
// breaks the NAT, and makes things like DNS not accept them. If
|
|
|
|
// this could be resolved, it would simplify all of this code.
|
|
|
|
//
|
|
|
|
// If the proxy is bound to a specific IP, then we have to use DNAT to
|
|
|
|
// that IP. Unlike the previous case, this works because the proxy is
|
|
|
|
// ONLY listening on that IP, not the bridge.
|
2014-09-18 23:03:34 +00:00
|
|
|
//
|
|
|
|
// Why would anyone bind to an address that is not inclusive of
|
|
|
|
// localhost? Apparently some cloud environments have their public IP
|
|
|
|
// exposed as a real network interface AND do not have firewalling. We
|
|
|
|
// don't want to expose everything out to the world.
|
|
|
|
//
|
|
|
|
// Unfortunately, I don't know of any way to listen on some (N > 1)
|
|
|
|
// interfaces but not ALL interfaces, short of doing it manually, and
|
|
|
|
// this is simpler than that.
|
2014-11-28 07:54:55 +00:00
|
|
|
//
|
|
|
|
// If the proxy is bound to localhost only, all of this is broken. Not
|
|
|
|
// allowed.
|
|
|
|
if proxyIP.Equal(zeroIPv4) || proxyIP.Equal(zeroIPv6) {
|
2014-11-03 16:04:42 +00:00
|
|
|
// TODO: Can we REDIRECT with IPv6?
|
2014-09-18 23:03:34 +00:00
|
|
|
args = append(args, "-j", "REDIRECT", "--to-ports", fmt.Sprintf("%d", proxyPort))
|
|
|
|
} else {
|
2014-11-03 16:04:42 +00:00
|
|
|
// TODO: Can we DNAT with IPv6?
|
|
|
|
args = append(args, "-j", "DNAT", "--to-destination", net.JoinHostPort(proxyIP.String(), strconv.Itoa(proxyPort)))
|
2014-09-18 23:03:34 +00:00
|
|
|
}
|
|
|
|
return args
|
|
|
|
}
|
2014-11-28 07:54:55 +00:00
|
|
|
|
|
|
|
// Build a slice of iptables args for a from-host portal rule.
|
2015-03-13 15:16:41 +00:00
|
|
|
func (proxier *Proxier) iptablesHostPortalArgs(destIP net.IP, destPort int, protocol api.Protocol, proxyIP net.IP, proxyPort int, service ServicePortName) []string {
|
2014-11-28 07:54:55 +00:00
|
|
|
args := iptablesCommonPortalArgs(destIP, destPort, protocol, service)
|
|
|
|
|
|
|
|
// This is tricky.
|
|
|
|
//
|
|
|
|
// If the proxy is bound (see Proxier.listenIP) to 0.0.0.0 ("any
|
|
|
|
// interface") we want to do the same as from-container traffic and use
|
|
|
|
// REDIRECT. Except that it doesn't work (empirically). REDIRECT on
|
|
|
|
// localpackets sends the traffic to localhost (special case, but it is
|
|
|
|
// documented) but the response comes from the eth0 IP (not sure why,
|
|
|
|
// truthfully), which makes DNS unhappy.
|
|
|
|
//
|
|
|
|
// So we have to use DNAT. DNAT to 127.0.0.1 can't work for the same
|
|
|
|
// reason.
|
|
|
|
//
|
|
|
|
// So we do our best to find an interface that is not a loopback and
|
|
|
|
// DNAT to that. This works (again, empirically).
|
|
|
|
//
|
|
|
|
// If the proxy is bound to a specific IP, then we have to use DNAT to
|
|
|
|
// that IP. Unlike the previous case, this works because the proxy is
|
|
|
|
// ONLY listening on that IP, not the bridge.
|
|
|
|
//
|
|
|
|
// If the proxy is bound to localhost only, this should work, but we
|
|
|
|
// don't allow it for now.
|
|
|
|
if proxyIP.Equal(zeroIPv4) || proxyIP.Equal(zeroIPv6) {
|
|
|
|
proxyIP = proxier.hostIP
|
|
|
|
}
|
|
|
|
// TODO: Can we DNAT with IPv6?
|
|
|
|
args = append(args, "-j", "DNAT", "--to-destination", net.JoinHostPort(proxyIP.String(), strconv.Itoa(proxyPort)))
|
|
|
|
return args
|
|
|
|
}
|
2015-04-11 15:46:44 +00:00
|
|
|
|
|
|
|
func isTooManyFDsError(err error) bool {
|
|
|
|
return strings.Contains(err.Error(), "too many open files")
|
|
|
|
}
|
2015-04-12 05:08:54 +00:00
|
|
|
|
|
|
|
func isClosedError(err error) bool {
|
|
|
|
// A brief discussion about handling closed error here:
|
|
|
|
// https://code.google.com/p/go/issues/detail?id=4373#c14
|
|
|
|
// TODO: maybe create a stoppable TCP listener that returns a StoppedError
|
|
|
|
return strings.HasSuffix(err.Error(), "use of closed network connection")
|
|
|
|
}
|