123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329 |
- package awsvpc
- import (
- "encoding/json"
- "fmt"
- "net"
- "sync"
- "github.com/aws/aws-sdk-go/aws"
- "github.com/aws/aws-sdk-go/aws/awserr"
- "github.com/aws/aws-sdk-go/aws/ec2metadata"
- "github.com/aws/aws-sdk-go/aws/session"
- "github.com/aws/aws-sdk-go/service/ec2"
- "golang.org/x/net/context"
- "github.com/coreos/flannel/backend"
- "github.com/coreos/flannel/pkg/ip"
- "github.com/coreos/flannel/subnet"
- log "k8s.io/klog"
- )
- func init() {
- backend.Register("aws-vpc", New)
- }
- type AwsVpcBackend struct {
- sm subnet.Manager
- extIface *backend.ExternalInterface
- }
- func New(sm subnet.Manager, extIface *backend.ExternalInterface) (backend.Backend, error) {
- be := AwsVpcBackend{
- sm: sm,
- extIface: extIface,
- }
- return &be, nil
- }
- type backendConfig struct {
- RouteTableID interface{} `json:"RouteTableID"`
- }
- func (conf *backendConfig) routeTables() ([]string, error) {
- if table, ok := conf.RouteTableID.(string); ok {
- log.Infof("RouteTableID configured as string: %s", table)
- return []string{table}, nil
- }
- if rawTables, ok := conf.RouteTableID.([]interface{}); ok {
- log.Infof("RouteTableID configured as slice: %+v", rawTables)
- tables := make([]string, len(rawTables))
- for idx, t := range rawTables {
- table, ok := t.(string)
- if !ok {
- return nil, fmt.Errorf("Unexpected type in RouteTableID slice. Must be strings.")
- }
- tables[idx] = table
- }
- return tables, nil
- }
- return nil, fmt.Errorf("Unexpected RouteTableID type. Must be string or array of strings.")
- }
- func (conf *backendConfig) routeTableConfigured() bool {
- configured := conf.RouteTableID != nil
- log.Infof("Route table configured: %t", configured)
- return configured
- }
- func (be *AwsVpcBackend) RegisterNetwork(ctx context.Context, wg *sync.WaitGroup, config *subnet.Config) (backend.Network, error) {
-
- var cfg backendConfig
- if len(config.Backend) > 0 {
- log.Infof("Backend configured as: %s", string(config.Backend))
- if err := json.Unmarshal(config.Backend, &cfg); err != nil {
- return nil, fmt.Errorf("error decoding VPC backend config: %v", err)
- }
- }
-
- attrs := subnet.LeaseAttrs{
- PublicIP: ip.FromIP(be.extIface.ExtAddr),
- }
- l, err := be.sm.AcquireLease(ctx, &attrs)
- switch err {
- case nil:
- case context.Canceled, context.DeadlineExceeded:
- return nil, err
- default:
- return nil, fmt.Errorf("failed to acquire lease: %v", err)
- }
- sess, _ := session.NewSession(aws.NewConfig().WithMaxRetries(5))
-
- metadataClient := ec2metadata.New(sess)
- region, err := metadataClient.Region()
- if err != nil {
- return nil, fmt.Errorf("error getting EC2 region name: %v", err)
- }
- sess.Config.Region = aws.String(region)
- instanceID, err := metadataClient.GetMetadata("instance-id")
- if err != nil {
- return nil, fmt.Errorf("error getting EC2 instance ID: %v", err)
- }
- ec2c := ec2.New(sess)
-
- eni, err := be.findENI(instanceID, ec2c)
- if err != nil || eni == nil {
- return nil, fmt.Errorf("unable to find ENI that matches the %s IP address. %s\n", be.extIface.IfaceAddr, err)
- }
-
- if err := be.disableSrcDestCheck(eni.NetworkInterfaceId, ec2c); err != nil {
- log.Warningf("failed to disable SourceDestCheck on %s: %s.\n", *eni.NetworkInterfaceId, err)
- }
- if !cfg.routeTableConfigured() {
- if cfg.RouteTableID, err = be.detectRouteTableID(eni, ec2c); err != nil {
- return nil, err
- }
- log.Infof("Found route table %s.\n", cfg.RouteTableID)
- }
- networkConfig, err := be.sm.GetNetworkConfig(ctx)
- if err != nil {
- log.Errorf("Error fetching network config: %v", err)
- }
- tables, err := cfg.routeTables()
- if err != nil {
- return nil, err
- }
- for _, routeTableID := range tables {
- err = be.cleanupBlackholeRoutes(routeTableID, networkConfig.Network, ec2c)
- if err != nil {
- log.Errorf("Error cleaning up blackhole routes: %v", err)
- }
- matchingRouteFound, err := be.checkMatchingRoutes(routeTableID, l.Subnet.String(), eni.NetworkInterfaceId, ec2c)
- if err != nil {
- log.Errorf("Error describing route tables: %v", err)
- }
- if !matchingRouteFound {
- cidrBlock := l.Subnet.String()
- deleteRouteInput := &ec2.DeleteRouteInput{RouteTableId: &routeTableID, DestinationCidrBlock: &cidrBlock}
- if _, err := ec2c.DeleteRoute(deleteRouteInput); err != nil {
- if ec2err, ok := err.(awserr.Error); !ok || ec2err.Code() != "InvalidRoute.NotFound" {
-
- return nil, fmt.Errorf("error deleting existing route for %s: %v", l.Subnet.String(), err)
- }
- }
-
- if err := be.createRoute(routeTableID, l.Subnet.String(), eni.NetworkInterfaceId, ec2c); err != nil {
- return nil, fmt.Errorf("unable to add route %s: %v", l.Subnet.String(), err)
- }
- }
- }
- return &backend.SimpleNetwork{
- SubnetLease: l,
- ExtIface: be.extIface,
- }, nil
- }
- func (be *AwsVpcBackend) cleanupBlackholeRoutes(routeTableID string, network ip.IP4Net, ec2c *ec2.EC2) error {
- filter := newFilter()
- filter.Add("route.state", "blackhole")
- input := ec2.DescribeRouteTablesInput{Filters: filter, RouteTableIds: []*string{&routeTableID}}
- resp, err := ec2c.DescribeRouteTables(&input)
- if err != nil {
- return err
- }
- for _, routeTable := range resp.RouteTables {
- for _, route := range routeTable.Routes {
- if *route.State == "blackhole" && route.DestinationCidrBlock != nil {
- _, subnet, err := net.ParseCIDR(*route.DestinationCidrBlock)
- if err == nil && network.Contains(ip.FromIP(subnet.IP)) {
- log.Infof("Removing blackhole route: ", *route.DestinationCidrBlock)
- deleteRouteInput := &ec2.DeleteRouteInput{RouteTableId: &routeTableID, DestinationCidrBlock: route.DestinationCidrBlock}
- if _, err := ec2c.DeleteRoute(deleteRouteInput); err != nil {
- if ec2err, ok := err.(awserr.Error); !ok || ec2err.Code() != "InvalidRoute.NotFound" {
-
- return err
- }
- }
- }
- }
- }
- }
- return nil
- }
- func (be *AwsVpcBackend) checkMatchingRoutes(routeTableID, subnet string, eniID *string, ec2c *ec2.EC2) (bool, error) {
- matchingRouteFound := false
- filter := newFilter()
- filter.Add("route.destination-cidr-block", subnet)
- filter.Add("route.state", "active")
- input := ec2.DescribeRouteTablesInput{Filters: filter, RouteTableIds: []*string{&routeTableID}}
- resp, err := ec2c.DescribeRouteTables(&input)
- if err != nil {
- return matchingRouteFound, err
- }
- for _, routeTable := range resp.RouteTables {
- for _, route := range routeTable.Routes {
- if route.DestinationCidrBlock != nil && subnet == *route.DestinationCidrBlock &&
- *route.State == "active" && route.NetworkInterfaceId == eniID {
- matchingRouteFound = true
- break
- }
- }
- }
- return matchingRouteFound, nil
- }
- func (be *AwsVpcBackend) createRoute(routeTableID, subnet string, eniID *string, ec2c *ec2.EC2) error {
- route := &ec2.CreateRouteInput{
- RouteTableId: &routeTableID,
- NetworkInterfaceId: eniID,
- DestinationCidrBlock: &subnet,
- }
- if _, err := ec2c.CreateRoute(route); err != nil {
- return err
- }
- log.Infof("Route added to table %s: %s - %s.\n", routeTableID, subnet, *eniID)
- return nil
- }
- func (be *AwsVpcBackend) disableSrcDestCheck(eniID *string, ec2c *ec2.EC2) error {
- attr := &ec2.ModifyNetworkInterfaceAttributeInput{
- NetworkInterfaceId: eniID,
- SourceDestCheck: &ec2.AttributeBooleanValue{Value: aws.Bool(false)},
- }
- _, err := ec2c.ModifyNetworkInterfaceAttribute(attr)
- return err
- }
- func (be *AwsVpcBackend) detectRouteTableID(eni *ec2.InstanceNetworkInterface, ec2c *ec2.EC2) (string, error) {
- subnetID := eni.SubnetId
- vpcID := eni.VpcId
- filter := newFilter()
- filter.Add("association.subnet-id", *subnetID)
- routeTablesInput := &ec2.DescribeRouteTablesInput{
- Filters: filter,
- }
- res, err := ec2c.DescribeRouteTables(routeTablesInput)
- if err != nil {
- return "", fmt.Errorf("error describing routeTables for subnetID %s: %v", *subnetID, err)
- }
- if len(res.RouteTables) != 0 {
- return *res.RouteTables[0].RouteTableId, nil
- }
- filter = newFilter()
- filter.Add("association.main", "true")
- filter.Add("vpc-id", *vpcID)
- routeTablesInput = &ec2.DescribeRouteTablesInput{
- Filters: filter,
- }
- res, err = ec2c.DescribeRouteTables(routeTablesInput)
- if err != nil {
- log.Infof("error describing route tables: ", err)
- }
- if len(res.RouteTables) == 0 {
- return "", fmt.Errorf("main route table not found")
- }
- return *res.RouteTables[0].RouteTableId, nil
- }
- func (be *AwsVpcBackend) findENI(instanceID string, ec2c *ec2.EC2) (*ec2.InstanceNetworkInterface, error) {
- instance, err := ec2c.DescribeInstances(&ec2.DescribeInstancesInput{
- InstanceIds: []*string{aws.String(instanceID)}},
- )
- if err != nil {
- return nil, err
- }
- for _, n := range instance.Reservations[0].Instances[0].NetworkInterfaces {
- for _, a := range n.PrivateIpAddresses {
- if *a.PrivateIpAddress == be.extIface.IfaceAddr.String() {
- log.Infof("Found %s that has %s IP address.\n", *n.NetworkInterfaceId, be.extIface.IfaceAddr)
- return n, nil
- }
- }
- }
- return nil, err
- }
|