hostgw.go 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174
  1. package hostgw
  2. import (
  3. "fmt"
  4. "net"
  5. "strings"
  6. "sync"
  7. log "github.com/coreos/flannel/Godeps/_workspace/src/github.com/golang/glog"
  8. "github.com/coreos/flannel/Godeps/_workspace/src/github.com/vishvananda/netlink"
  9. "github.com/coreos/flannel/backend"
  10. "github.com/coreos/flannel/pkg/ip"
  11. "github.com/coreos/flannel/pkg/task"
  12. "github.com/coreos/flannel/subnet"
  13. )
  14. type HostgwBackend struct {
  15. sm *subnet.SubnetManager
  16. extIface *net.Interface
  17. extIP net.IP
  18. stop chan bool
  19. wg sync.WaitGroup
  20. }
  21. func New(sm *subnet.SubnetManager) backend.Backend {
  22. b := &HostgwBackend{
  23. sm: sm,
  24. stop: make(chan bool),
  25. }
  26. return b
  27. }
  28. func (rb *HostgwBackend) Init(extIface *net.Interface, extIP net.IP, ipMasq bool) (*backend.SubnetDef, error) {
  29. rb.extIface = extIface
  30. rb.extIP = extIP
  31. attrs := subnet.LeaseAttrs{
  32. PublicIP: ip.FromIP(extIP),
  33. BackendType: "host-gw",
  34. }
  35. sn, err := rb.sm.AcquireLease(&attrs, rb.stop)
  36. if err != nil {
  37. if err == task.ErrCanceled {
  38. return nil, err
  39. } else {
  40. return nil, fmt.Errorf("Failed to acquire lease: %v", err)
  41. }
  42. }
  43. if ipMasq {
  44. if err := setupIpMasq(sn, rb.sm.GetConfig().Network); err != nil {
  45. return nil, fmt.Errorf("Failed to configure ip-masq: %v", err)
  46. }
  47. }
  48. /* NB: docker will create the local route to `sn` */
  49. return &backend.SubnetDef{
  50. Net: sn,
  51. MTU: extIface.MTU,
  52. }, nil
  53. }
  54. func (rb *HostgwBackend) Run() {
  55. rb.wg.Add(1)
  56. go func() {
  57. rb.sm.LeaseRenewer(rb.stop)
  58. rb.wg.Done()
  59. }()
  60. log.Info("Watching for new subnet leases")
  61. evts := make(chan subnet.EventBatch)
  62. rb.wg.Add(1)
  63. go func() {
  64. rb.sm.WatchLeases(evts, rb.stop)
  65. rb.wg.Done()
  66. }()
  67. defer rb.wg.Wait()
  68. for {
  69. select {
  70. case evtBatch := <-evts:
  71. rb.handleSubnetEvents(evtBatch)
  72. case <-rb.stop:
  73. return
  74. }
  75. }
  76. }
  77. func (rb *HostgwBackend) Stop() {
  78. close(rb.stop)
  79. }
  80. func (rb *HostgwBackend) Name() string {
  81. return "host-gw"
  82. }
  83. func (rb *HostgwBackend) handleSubnetEvents(batch subnet.EventBatch) {
  84. for _, evt := range batch {
  85. switch evt.Type {
  86. case subnet.SubnetAdded:
  87. log.Infof("Subnet added: %v via %v", evt.Lease.Network, evt.Lease.Attrs.PublicIP)
  88. if evt.Lease.Attrs.BackendType != "host-gw" {
  89. log.Warningf("Ignoring non-host-gw subnet: type=%v", evt.Lease.Attrs.BackendType)
  90. continue
  91. }
  92. route := netlink.Route{
  93. Dst: evt.Lease.Network.ToIPNet(),
  94. Gw: evt.Lease.Attrs.PublicIP.ToIP(),
  95. LinkIndex: rb.extIface.Index,
  96. }
  97. if err := netlink.RouteAdd(&route); err != nil {
  98. log.Errorf("Error adding route to %v via %v: %v", evt.Lease.Network, evt.Lease.Attrs.PublicIP, err)
  99. continue
  100. }
  101. case subnet.SubnetRemoved:
  102. log.Info("Subnet removed: ", evt.Lease.Network)
  103. if evt.Lease.Attrs.BackendType != "host-gw" {
  104. log.Warningf("Ignoring non-host-gw subnet: type=%v", evt.Lease.Attrs.BackendType)
  105. continue
  106. }
  107. route := netlink.Route{
  108. Dst: evt.Lease.Network.ToIPNet(),
  109. Gw: evt.Lease.Attrs.PublicIP.ToIP(),
  110. LinkIndex: rb.extIface.Index,
  111. }
  112. if err := netlink.RouteDel(&route); err != nil {
  113. log.Errorf("Error deleting route to %v: %v", evt.Lease.Network, err)
  114. continue
  115. }
  116. default:
  117. log.Error("Internal error: unknown event type: ", int(evt.Type))
  118. }
  119. }
  120. }
  121. func setupIpMasq(localNet ip.IP4Net, overlayNet ip.IP4Net) error {
  122. ipt, err := ip.NewIPTables()
  123. if err != nil {
  124. return err
  125. }
  126. err = ipt.ClearChain("nat", "FLANNEL")
  127. if err != nil {
  128. return fmt.Errorf("Failed to create/clear FLANNEL chain in NAT table: %v", err)
  129. }
  130. rules := [][]string{
  131. []string{"FLANNEL", "-s", localNet.String(), "-o", "lo", "-j", "ACCEPT"},
  132. []string{"FLANNEL", "-s", localNet.String(), "!", "-d", overlayNet.String(), "-j", "MASQUERADE"},
  133. []string{"POSTROUTING", "-s", localNet.String(), "-j", "FLANNEL"},
  134. }
  135. for _, args := range rules {
  136. log.Info("Adding iptables rule: ", strings.Join(args, " "))
  137. if err := ipt.AppendUnique("nat", args...); err != nil {
  138. return fmt.Errorf("Failed to insert IP masquerade rule: %v", err)
  139. }
  140. }
  141. return nil
  142. }