awsvpc.go 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328
  1. // Copyright 2015 flannel authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. // +build !windows
  15. package awsvpc
  16. import (
  17. "encoding/json"
  18. "fmt"
  19. "github.com/aws/aws-sdk-go/aws"
  20. "github.com/aws/aws-sdk-go/aws/awserr"
  21. "github.com/aws/aws-sdk-go/aws/ec2metadata"
  22. "github.com/aws/aws-sdk-go/aws/session"
  23. "github.com/aws/aws-sdk-go/service/ec2"
  24. log "github.com/golang/glog"
  25. "golang.org/x/net/context"
  26. "net"
  27. "sync"
  28. "github.com/coreos/flannel/backend"
  29. "github.com/coreos/flannel/pkg/ip"
  30. "github.com/coreos/flannel/subnet"
  31. )
  32. func init() {
  33. backend.Register("aws-vpc", New)
  34. }
  35. type AwsVpcBackend struct {
  36. sm subnet.Manager
  37. extIface *backend.ExternalInterface
  38. }
  39. func New(sm subnet.Manager, extIface *backend.ExternalInterface) (backend.Backend, error) {
  40. be := AwsVpcBackend{
  41. sm: sm,
  42. extIface: extIface,
  43. }
  44. return &be, nil
  45. }
  46. type backendConfig struct {
  47. RouteTableID interface{} `json:"RouteTableID"`
  48. }
  49. func (conf *backendConfig) routeTables() ([]string, error) {
  50. if table, ok := conf.RouteTableID.(string); ok {
  51. log.Info("RouteTableID configured as string: %s", table)
  52. return []string{table}, nil
  53. }
  54. if rawTables, ok := conf.RouteTableID.([]interface{}); ok {
  55. log.Info("RouteTableID configured as slice: %+v", rawTables)
  56. tables := make([]string, len(rawTables))
  57. for idx, t := range rawTables {
  58. table, ok := t.(string)
  59. if !ok {
  60. return nil, fmt.Errorf("Unexpected type in RouteTableID slice. Must be strings.")
  61. }
  62. tables[idx] = table
  63. }
  64. return tables, nil
  65. }
  66. return nil, fmt.Errorf("Unexpected RouteTableID type. Must be string or array of strings.")
  67. }
  68. func (conf *backendConfig) routeTableConfigured() bool {
  69. configured := conf.RouteTableID != nil
  70. log.Infof("Route table configured: %t", configured)
  71. return configured
  72. }
  73. func (be *AwsVpcBackend) RegisterNetwork(ctx context.Context, wg sync.WaitGroup, config *subnet.Config) (backend.Network, error) {
  74. // Parse our configuration
  75. var cfg backendConfig
  76. if len(config.Backend) > 0 {
  77. log.Info("Backend configured as: %s", string(config.Backend))
  78. if err := json.Unmarshal(config.Backend, &cfg); err != nil {
  79. return nil, fmt.Errorf("error decoding VPC backend config: %v", err)
  80. }
  81. }
  82. // Acquire the lease form subnet manager
  83. attrs := subnet.LeaseAttrs{
  84. PublicIP: ip.FromIP(be.extIface.ExtAddr),
  85. }
  86. l, err := be.sm.AcquireLease(ctx, &attrs)
  87. switch err {
  88. case nil:
  89. case context.Canceled, context.DeadlineExceeded:
  90. return nil, err
  91. default:
  92. return nil, fmt.Errorf("failed to acquire lease: %v", err)
  93. }
  94. sess, _ := session.NewSession(aws.NewConfig().WithMaxRetries(5))
  95. // Figure out this machine's EC2 instance ID and region
  96. metadataClient := ec2metadata.New(sess)
  97. region, err := metadataClient.Region()
  98. if err != nil {
  99. return nil, fmt.Errorf("error getting EC2 region name: %v", err)
  100. }
  101. sess.Config.Region = aws.String(region)
  102. instanceID, err := metadataClient.GetMetadata("instance-id")
  103. if err != nil {
  104. return nil, fmt.Errorf("error getting EC2 instance ID: %v", err)
  105. }
  106. ec2c := ec2.New(sess)
  107. // Find ENI which contains the external network interface IP address
  108. eni, err := be.findENI(instanceID, ec2c)
  109. if err != nil || eni == nil {
  110. return nil, fmt.Errorf("unable to find ENI that matches the %s IP address. %s\n", be.extIface.IfaceAddr, err)
  111. }
  112. // Try to disable SourceDestCheck on the main network interface
  113. if err := be.disableSrcDestCheck(eni.NetworkInterfaceId, ec2c); err != nil {
  114. log.Warningf("failed to disable SourceDestCheck on %s: %s.\n", *eni.NetworkInterfaceId, err)
  115. }
  116. if !cfg.routeTableConfigured() {
  117. if cfg.RouteTableID, err = be.detectRouteTableID(eni, ec2c); err != nil {
  118. return nil, err
  119. }
  120. log.Infof("Found route table %s.\n", cfg.RouteTableID)
  121. }
  122. networkConfig, err := be.sm.GetNetworkConfig(ctx)
  123. if err != nil {
  124. log.Errorf("Error fetching network config: %v", err)
  125. }
  126. tables, err := cfg.routeTables()
  127. if err != nil {
  128. return nil, err
  129. }
  130. for _, routeTableID := range tables {
  131. err = be.cleanupBlackholeRoutes(routeTableID, networkConfig.Network, ec2c)
  132. if err != nil {
  133. log.Errorf("Error cleaning up blackhole routes: %v", err)
  134. }
  135. matchingRouteFound, err := be.checkMatchingRoutes(routeTableID, l.Subnet.String(), eni.NetworkInterfaceId, ec2c)
  136. if err != nil {
  137. log.Errorf("Error describing route tables: %v", err)
  138. }
  139. if !matchingRouteFound {
  140. cidrBlock := l.Subnet.String()
  141. deleteRouteInput := &ec2.DeleteRouteInput{RouteTableId: &routeTableID, DestinationCidrBlock: &cidrBlock}
  142. if _, err := ec2c.DeleteRoute(deleteRouteInput); err != nil {
  143. if ec2err, ok := err.(awserr.Error); !ok || ec2err.Code() != "InvalidRoute.NotFound" {
  144. // an error other than the route not already existing occurred
  145. return nil, fmt.Errorf("error deleting existing route for %s: %v", l.Subnet.String(), err)
  146. }
  147. }
  148. // Add the route for this machine's subnet
  149. if err := be.createRoute(routeTableID, l.Subnet.String(), eni.NetworkInterfaceId, ec2c); err != nil {
  150. return nil, fmt.Errorf("unable to add route %s: %v", l.Subnet.String(), err)
  151. }
  152. }
  153. }
  154. return &backend.SimpleNetwork{
  155. SubnetLease: l,
  156. ExtIface: be.extIface,
  157. }, nil
  158. }
  159. func (be *AwsVpcBackend) cleanupBlackholeRoutes(routeTableID string, network ip.IP4Net, ec2c *ec2.EC2) error {
  160. filter := newFilter()
  161. filter.Add("route.state", "blackhole")
  162. input := ec2.DescribeRouteTablesInput{Filters: filter, RouteTableIds: []*string{&routeTableID}}
  163. resp, err := ec2c.DescribeRouteTables(&input)
  164. if err != nil {
  165. return err
  166. }
  167. for _, routeTable := range resp.RouteTables {
  168. for _, route := range routeTable.Routes {
  169. if *route.State == "blackhole" && route.DestinationCidrBlock != nil {
  170. _, subnet, err := net.ParseCIDR(*route.DestinationCidrBlock)
  171. if err == nil && network.Contains(ip.FromIP(subnet.IP)) {
  172. log.Info("Removing blackhole route: ", *route.DestinationCidrBlock)
  173. deleteRouteInput := &ec2.DeleteRouteInput{RouteTableId: &routeTableID, DestinationCidrBlock: route.DestinationCidrBlock}
  174. if _, err := ec2c.DeleteRoute(deleteRouteInput); err != nil {
  175. if ec2err, ok := err.(awserr.Error); !ok || ec2err.Code() != "InvalidRoute.NotFound" {
  176. // an error other than the route not already existing occurred
  177. return err
  178. }
  179. }
  180. }
  181. }
  182. }
  183. }
  184. return nil
  185. }
  186. func (be *AwsVpcBackend) checkMatchingRoutes(routeTableID, subnet string, eniID *string, ec2c *ec2.EC2) (bool, error) {
  187. matchingRouteFound := false
  188. filter := newFilter()
  189. filter.Add("route.destination-cidr-block", subnet)
  190. filter.Add("route.state", "active")
  191. input := ec2.DescribeRouteTablesInput{Filters: filter, RouteTableIds: []*string{&routeTableID}}
  192. resp, err := ec2c.DescribeRouteTables(&input)
  193. if err != nil {
  194. return matchingRouteFound, err
  195. }
  196. for _, routeTable := range resp.RouteTables {
  197. for _, route := range routeTable.Routes {
  198. if route.DestinationCidrBlock != nil && subnet == *route.DestinationCidrBlock &&
  199. *route.State == "active" && route.NetworkInterfaceId == eniID {
  200. matchingRouteFound = true
  201. break
  202. }
  203. }
  204. }
  205. return matchingRouteFound, nil
  206. }
  207. func (be *AwsVpcBackend) createRoute(routeTableID, subnet string, eniID *string, ec2c *ec2.EC2) error {
  208. route := &ec2.CreateRouteInput{
  209. RouteTableId: &routeTableID,
  210. NetworkInterfaceId: eniID,
  211. DestinationCidrBlock: &subnet,
  212. }
  213. if _, err := ec2c.CreateRoute(route); err != nil {
  214. return err
  215. }
  216. log.Infof("Route added to table %s: %s - %s.\n", routeTableID, subnet, *eniID)
  217. return nil
  218. }
  219. func (be *AwsVpcBackend) disableSrcDestCheck(eniID *string, ec2c *ec2.EC2) error {
  220. attr := &ec2.ModifyNetworkInterfaceAttributeInput{
  221. NetworkInterfaceId: eniID,
  222. SourceDestCheck: &ec2.AttributeBooleanValue{Value: aws.Bool(false)},
  223. }
  224. _, err := ec2c.ModifyNetworkInterfaceAttribute(attr)
  225. return err
  226. }
  227. // detectRouteTableID detect the routing table that is associated with the ENI,
  228. // subnet can be implicitly associated with the main routing table
  229. func (be *AwsVpcBackend) detectRouteTableID(eni *ec2.InstanceNetworkInterface, ec2c *ec2.EC2) (string, error) {
  230. subnetID := eni.SubnetId
  231. vpcID := eni.VpcId
  232. filter := newFilter()
  233. filter.Add("association.subnet-id", *subnetID)
  234. routeTablesInput := &ec2.DescribeRouteTablesInput{
  235. Filters: filter,
  236. }
  237. res, err := ec2c.DescribeRouteTables(routeTablesInput)
  238. if err != nil {
  239. return "", fmt.Errorf("error describing routeTables for subnetID %s: %v", *subnetID, err)
  240. }
  241. if len(res.RouteTables) != 0 {
  242. return *res.RouteTables[0].RouteTableId, nil
  243. }
  244. filter = newFilter()
  245. filter.Add("association.main", "true")
  246. filter.Add("vpc-id", *vpcID)
  247. routeTablesInput = &ec2.DescribeRouteTablesInput{
  248. Filters: filter,
  249. }
  250. res, err = ec2c.DescribeRouteTables(routeTablesInput)
  251. if err != nil {
  252. log.Info("error describing route tables: ", err)
  253. }
  254. if len(res.RouteTables) == 0 {
  255. return "", fmt.Errorf("main route table not found")
  256. }
  257. return *res.RouteTables[0].RouteTableId, nil
  258. }
  259. func (be *AwsVpcBackend) findENI(instanceID string, ec2c *ec2.EC2) (*ec2.InstanceNetworkInterface, error) {
  260. instance, err := ec2c.DescribeInstances(&ec2.DescribeInstancesInput{
  261. InstanceIds: []*string{aws.String(instanceID)}},
  262. )
  263. if err != nil {
  264. return nil, err
  265. }
  266. for _, n := range instance.Reservations[0].Instances[0].NetworkInterfaces {
  267. for _, a := range n.PrivateIpAddresses {
  268. if *a.PrivateIpAddress == be.extIface.IfaceAddr.String() {
  269. log.Infof("Found %s that has %s IP address.\n", *n.NetworkInterfaceId, be.extIface.IfaceAddr)
  270. return n, nil
  271. }
  272. }
  273. }
  274. return nil, err
  275. }