| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289 |
- // Copyright 2019 the Kilo authors
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package iptables
- import (
- "fmt"
- "net"
- "strings"
- "sync"
- "time"
- "github.com/coreos/go-iptables/iptables"
- )
- type iptablesClient interface {
- AppendUnique(string, string, ...string) error
- Delete(string, string, ...string) error
- Exists(string, string, ...string) (bool, error)
- ClearChain(string, string) error
- DeleteChain(string, string) error
- NewChain(string, string) error
- }
- // rule represents an iptables rule.
- type rule struct {
- table string
- chain string
- spec []string
- client iptablesClient
- }
- func (r *rule) Add() error {
- if err := r.client.AppendUnique(r.table, r.chain, r.spec...); err != nil {
- return fmt.Errorf("failed to add iptables rule: %v", err)
- }
- return nil
- }
- func (r *rule) Delete() error {
- // Ignore the returned error as an error likely means
- // that the rule doesn't exist, which is fine.
- r.client.Delete(r.table, r.chain, r.spec...)
- return nil
- }
- func (r *rule) Exists() (bool, error) {
- return r.client.Exists(r.table, r.chain, r.spec...)
- }
- func (r *rule) String() string {
- if r == nil {
- return ""
- }
- return fmt.Sprintf("%s_%s_%s", r.table, r.chain, strings.Join(r.spec, "_"))
- }
- // chain represents an iptables chain.
- type chain struct {
- table string
- chain string
- client iptablesClient
- }
- func (c *chain) Add() error {
- if err := c.client.ClearChain(c.table, c.chain); err != nil {
- return fmt.Errorf("failed to add iptables chain: %v", err)
- }
- return nil
- }
- func (c *chain) Delete() error {
- // The chain must be empty before it can be deleted.
- if err := c.client.ClearChain(c.table, c.chain); err != nil {
- return fmt.Errorf("failed to clear iptables chain: %v", err)
- }
- // Ignore the returned error as an error likely means
- // that the chain doesn't exist, which is fine.
- c.client.DeleteChain(c.table, c.chain)
- return nil
- }
- func (c *chain) Exists() (bool, error) {
- // The code for "chain already exists".
- existsErr := 1
- err := c.client.NewChain(c.table, c.chain)
- se, ok := err.(statusExiter)
- switch {
- case err == nil:
- // If there was no error adding a new chain, then it did not exist.
- // Delete it and return false.
- c.client.DeleteChain(c.table, c.chain)
- return false, nil
- case ok && se.ExitStatus() == existsErr:
- return true, nil
- default:
- return false, err
- }
- }
- func (c *chain) String() string {
- if c == nil {
- return ""
- }
- return fmt.Sprintf("%s_%s", c.table, c.chain)
- }
- // Rule is an interface for interacting with iptables objects.
- type Rule interface {
- Add() error
- Delete() error
- Exists() (bool, error)
- String() string
- }
- // Controller is able to reconcile a given set of iptables rules.
- type Controller struct {
- client iptablesClient
- errors chan error
- rules map[string]Rule
- mu sync.Mutex
- subscribed bool
- }
- // New generates a new iptables rules controller.
- // It expects an IP address length to determine
- // whether to operate in IPv4 or IPv6 mode.
- func New(ipLength int) (*Controller, error) {
- p := iptables.ProtocolIPv4
- if ipLength == net.IPv6len {
- p = iptables.ProtocolIPv6
- }
- client, err := iptables.NewWithProtocol(p)
- if err != nil {
- return nil, fmt.Errorf("failed to create iptables client: %v", err)
- }
- return &Controller{
- client: client,
- errors: make(chan error),
- rules: make(map[string]Rule),
- }, nil
- }
- // Run watches for changes to iptables rules and reconciles
- // the rules against the desired state.
- func (c *Controller) Run(stop <-chan struct{}) (<-chan error, error) {
- c.mu.Lock()
- if c.subscribed {
- c.mu.Unlock()
- return c.errors, nil
- }
- // Ensure a given instance only subscribes once.
- c.subscribed = true
- c.mu.Unlock()
- go func() {
- defer close(c.errors)
- for {
- select {
- case <-time.After(5 * time.Second):
- case <-stop:
- return
- }
- c.mu.Lock()
- for _, r := range c.rules {
- ok, err := r.Exists()
- if err != nil {
- nonBlockingSend(c.errors, fmt.Errorf("failed to check if rule exists: %v", err))
- }
- if !ok {
- if err := r.Add(); err != nil {
- nonBlockingSend(c.errors, fmt.Errorf("failed to add rule: %v", err))
- }
- }
- }
- c.mu.Unlock()
- }
- }()
- return c.errors, nil
- }
- // Set idempotently overwrites any iptables rules previously defined
- // for the controller with the given set of rules.
- func (c *Controller) Set(rules []Rule) error {
- r := make(map[string]struct{})
- for i := range rules {
- if rules[i] == nil {
- continue
- }
- switch v := rules[i].(type) {
- case *rule:
- v.client = c.client
- case *chain:
- v.client = c.client
- }
- r[rules[i].String()] = struct{}{}
- }
- c.mu.Lock()
- defer c.mu.Unlock()
- for k, rule := range c.rules {
- if _, ok := r[k]; !ok {
- if err := rule.Delete(); err != nil {
- return fmt.Errorf("failed to delete rule: %v", err)
- }
- delete(c.rules, k)
- }
- }
- // Iterate over the slice rather than the map
- // to ensure the rules are added in order.
- for _, rule := range rules {
- if _, ok := c.rules[rule.String()]; !ok {
- if err := rule.Add(); err != nil {
- return fmt.Errorf("failed to add rule: %v", err)
- }
- c.rules[rule.String()] = rule
- }
- }
- return nil
- }
- // CleanUp will clean up any rules created by the controller.
- func (c *Controller) CleanUp() error {
- c.mu.Lock()
- defer c.mu.Unlock()
- for k, rule := range c.rules {
- if err := rule.Delete(); err != nil {
- return fmt.Errorf("failed to delete rule: %v", err)
- }
- delete(c.rules, k)
- }
- return nil
- }
- // EncapsulateRules returns a set of iptables rules that are necessary
- // when traffic between nodes must be encapsulated.
- func EncapsulateRules(nodes []*net.IPNet) []Rule {
- var rules []Rule
- for _, n := range nodes {
- // Accept encapsulated traffic from peers.
- rules = append(rules, &rule{"filter", "INPUT", []string{"-m", "comment", "--comment", "Kilo: allow IPIP traffic", "-s", n.IP.String(), "-p", "4", "-j", "ACCEPT"}, nil})
- }
- return rules
- }
- // ForwardRules returns a set of iptables rules that are necessary
- // when traffic must be forwarded for the overlay.
- func ForwardRules(subnet *net.IPNet) []Rule {
- s := subnet.String()
- return []Rule{
- // Forward traffic to and from the overlay.
- &rule{"filter", "FORWARD", []string{"-s", s, "-j", "ACCEPT"}, nil},
- &rule{"filter", "FORWARD", []string{"-d", s, "-j", "ACCEPT"}, nil},
- }
- }
- // MasqueradeRules returns a set of iptables rules that are necessary
- // when traffic must be masqueraded for Kilo.
- func MasqueradeRules(subnet, localPodSubnet *net.IPNet, remotePodSubnet []*net.IPNet) []Rule {
- var rules []Rule
- rules = append(rules, &chain{"mangle", "KILO-MARK", nil})
- rules = append(rules, &rule{"mangle", "PREROUTING", []string{"-m", "comment", "--comment", "Kilo: jump to mark chain", "-i", "kilo+", "-j", "KILO-MARK"}, nil})
- rules = append(rules, &rule{"mangle", "KILO-MARK", []string{"-m", "comment", "--comment", "Kilo: do not mark packets destined for the local Pod subnet", "-d", localPodSubnet.String(), "-j", "RETURN"}, nil})
- if subnet != nil {
- rules = append(rules, &rule{"mangle", "KILO-MARK", []string{"-m", "comment", "--comment", "Kilo: do not mark packets destined for the local private subnet", "-d", subnet.String(), "-j", "RETURN"}, nil})
- }
- rules = append(rules, &rule{"mangle", "KILO-MARK", []string{"-m", "comment", "--comment", "Kilo: remaining packets should be marked for NAT", "-j", "MARK", "--set-xmark", "0x1107/0x1107"}, nil})
- rules = append(rules, &rule{"nat", "POSTROUTING", []string{"-m", "comment", "--comment", "Kilo: NAT packets from Kilo interface", "-m", "mark", "--mark", "0x1107/0x1107", "-j", "MASQUERADE"}, nil})
- for _, r := range remotePodSubnet {
- rules = append(rules, &rule{"nat", "POSTROUTING", []string{"-m", "comment", "--comment", "Kilo: NAT packets from local pod subnet to remote pod subnets", "-s", localPodSubnet.String(), "-d", r.String(), "-j", "MASQUERADE"}, nil})
- }
- return rules
- }
- func nonBlockingSend(errors chan<- error, err error) {
- select {
- case errors <- err:
- default:
- }
- }
|