2019-01-12 04:58:27 +00:00
/ *
Copyright 2016 The Kubernetes Authors .
Licensed under the Apache License , Version 2.0 ( the "License" ) ;
you may not use this file except in compliance with the License .
You may obtain a copy of the License at
http : //www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing , software
distributed under the License is distributed on an "AS IS" BASIS ,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND , either express or implied .
See the License for the specific language governing permissions and
limitations under the License .
* /
package service
import (
"fmt"
"strings"
2021-03-18 22:40:29 +00:00
v1 "k8s.io/api/core/v1"
2019-04-07 17:07:55 +00:00
utilnet "k8s.io/utils/net"
2019-01-12 04:58:27 +00:00
)
const (
defaultLoadBalancerSourceRanges = "0.0.0.0/0"
)
2019-04-07 17:07:55 +00:00
// IsAllowAll checks whether the utilnet.IPNet allows traffic from 0.0.0.0/0
func IsAllowAll ( ipnets utilnet . IPNetSet ) bool {
2019-01-12 04:58:27 +00:00
for _ , s := range ipnets . StringSlice ( ) {
if s == "0.0.0.0/0" {
return true
}
}
return false
}
// GetLoadBalancerSourceRanges first try to parse and verify LoadBalancerSourceRanges field from a service.
// If the field is not specified, turn to parse and verify the AnnotationLoadBalancerSourceRangesKey annotation from a service,
// extracting the source ranges to allow, and if not present returns a default (allow-all) value.
2019-04-07 17:07:55 +00:00
func GetLoadBalancerSourceRanges ( service * v1 . Service ) ( utilnet . IPNetSet , error ) {
var ipnets utilnet . IPNetSet
2019-01-12 04:58:27 +00:00
var err error
// if SourceRange field is specified, ignore sourceRange annotation
if len ( service . Spec . LoadBalancerSourceRanges ) > 0 {
specs := service . Spec . LoadBalancerSourceRanges
2019-04-07 17:07:55 +00:00
ipnets , err = utilnet . ParseIPNets ( specs ... )
2019-01-12 04:58:27 +00:00
if err != nil {
return nil , fmt . Errorf ( "service.Spec.LoadBalancerSourceRanges: %v is not valid. Expecting a list of IP ranges. For example, 10.0.0.0/24. Error msg: %v" , specs , err )
}
} else {
val := service . Annotations [ v1 . AnnotationLoadBalancerSourceRangesKey ]
val = strings . TrimSpace ( val )
if val == "" {
val = defaultLoadBalancerSourceRanges
}
specs := strings . Split ( val , "," )
2019-04-07 17:07:55 +00:00
ipnets , err = utilnet . ParseIPNets ( specs ... )
2019-01-12 04:58:27 +00:00
if err != nil {
return nil , fmt . Errorf ( "%s: %s is not valid. Expecting a comma-separated list of source IP ranges. For example, 10.0.0.0/24,192.168.2.0/24" , v1 . AnnotationLoadBalancerSourceRangesKey , val )
}
}
return ipnets , nil
}
// RequestsOnlyLocalTraffic checks if service requests OnlyLocal traffic.
func RequestsOnlyLocalTraffic ( service * v1 . Service ) bool {
if service . Spec . Type != v1 . ServiceTypeLoadBalancer &&
service . Spec . Type != v1 . ServiceTypeNodePort {
return false
}
return service . Spec . ExternalTrafficPolicy == v1 . ServiceExternalTrafficPolicyTypeLocal
}
2021-03-18 22:40:29 +00:00
// RequestsOnlyLocalTrafficForInternal checks if service prefers Node Local
// endpoints for internal traffic
func RequestsOnlyLocalTrafficForInternal ( service * v1 . Service ) bool {
if service . Spec . InternalTrafficPolicy == nil {
return false
}
return * service . Spec . InternalTrafficPolicy == v1 . ServiceInternalTrafficPolicyLocal
}
2019-01-12 04:58:27 +00:00
// NeedsHealthCheck checks if service needs health check.
func NeedsHealthCheck ( service * v1 . Service ) bool {
if service . Spec . Type != v1 . ServiceTypeLoadBalancer {
return false
}
return RequestsOnlyLocalTraffic ( service )
}
// GetServiceHealthCheckPathPort returns the path and nodePort programmed into the Cloud LB Health Check
func GetServiceHealthCheckPathPort ( service * v1 . Service ) ( string , int32 ) {
if ! NeedsHealthCheck ( service ) {
return "" , 0
}
port := service . Spec . HealthCheckNodePort
if port == 0 {
return "" , 0
}
return "/healthz" , port
}