hostgw_windows.go 8.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253
  1. // Copyright 2018 flannel authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package hostgw
  15. import (
  16. "fmt"
  17. "strconv"
  18. "sync"
  19. "time"
  20. "github.com/Microsoft/hcsshim"
  21. "github.com/coreos/flannel/backend"
  22. "github.com/coreos/flannel/pkg/ip"
  23. "github.com/coreos/flannel/subnet"
  24. log "github.com/golang/glog"
  25. "github.com/juju/errors"
  26. "github.com/rakelkar/gonetsh/netroute"
  27. "github.com/rakelkar/gonetsh/netsh"
  28. "golang.org/x/net/context"
  29. "k8s.io/apimachinery/pkg/util/json"
  30. "k8s.io/apimachinery/pkg/util/wait"
  31. utilexec "k8s.io/utils/exec"
  32. )
  33. func init() {
  34. backend.Register("host-gw", New)
  35. }
  36. type HostgwBackend struct {
  37. sm subnet.Manager
  38. extIface *backend.ExternalInterface
  39. }
  40. func New(sm subnet.Manager, extIface *backend.ExternalInterface) (backend.Backend, error) {
  41. if !extIface.ExtAddr.Equal(extIface.IfaceAddr) {
  42. return nil, fmt.Errorf("your PublicIP differs from interface IP, meaning that probably you're on a NAT, which is not supported by host-gw backend")
  43. }
  44. be := &HostgwBackend{
  45. sm: sm,
  46. extIface: extIface,
  47. }
  48. return be, nil
  49. }
  50. func (be *HostgwBackend) RegisterNetwork(ctx context.Context, wg sync.WaitGroup, config *subnet.Config) (backend.Network, error) {
  51. // 1. Parse configuration
  52. cfg := struct {
  53. Name string
  54. DNSServerList string
  55. }{}
  56. if len(config.Backend) > 0 {
  57. if err := json.Unmarshal(config.Backend, &cfg); err != nil {
  58. return nil, errors.Annotate(err, "error decoding windows host-gw backend config")
  59. }
  60. }
  61. if len(cfg.Name) == 0 {
  62. cfg.Name = "cbr0"
  63. }
  64. log.Infof("HOST-GW config: %+v", cfg)
  65. n := &backend.RouteNetwork{
  66. SimpleNetwork: backend.SimpleNetwork{
  67. ExtIface: be.extIface,
  68. },
  69. SM: be.sm,
  70. BackendType: "host-gw",
  71. Mtu: be.extIface.Iface.MTU,
  72. LinkIndex: be.extIface.Iface.Index,
  73. }
  74. n.GetRoute = func(lease *subnet.Lease) *netroute.Route {
  75. return &netroute.Route{
  76. DestinationSubnet: lease.Subnet.ToIPNet(),
  77. GatewayAddress: lease.Attrs.PublicIP.ToIP(),
  78. LinkIndex: n.LinkIndex,
  79. }
  80. }
  81. // 2. Acquire the lease form subnet manager
  82. attrs := subnet.LeaseAttrs{
  83. PublicIP: ip.FromIP(be.extIface.ExtAddr),
  84. BackendType: "host-gw",
  85. }
  86. l, err := be.sm.AcquireLease(ctx, &attrs)
  87. switch err {
  88. case nil:
  89. n.SubnetLease = l
  90. case context.Canceled, context.DeadlineExceeded:
  91. return nil, err
  92. default:
  93. return nil, errors.Annotate(err, "failed to acquire lease")
  94. }
  95. // 3. Check if the network exists and has the expected settings
  96. netshHelper := netsh.New(utilexec.New())
  97. createNewNetwork := true
  98. expectedSubnet := n.SubnetLease.Subnet
  99. expectedAddressPrefix := expectedSubnet.String()
  100. expectedGatewayAddress := (expectedSubnet.IP + 1).String()
  101. expectedPodGatewayAddress := expectedSubnet.IP + 2
  102. networkName := cfg.Name
  103. var waitErr, lastErr error
  104. existingNetwork, err := hcsshim.GetHNSNetworkByName(networkName)
  105. if err == nil {
  106. for _, subnet := range existingNetwork.Subnets {
  107. if subnet.AddressPrefix == expectedAddressPrefix && subnet.GatewayAddress == expectedGatewayAddress {
  108. createNewNetwork = false
  109. log.Infof("Found existing HNSNetwork %s", networkName)
  110. break
  111. }
  112. }
  113. }
  114. // 4. Create a new HNSNetwork
  115. expectedNetwork := existingNetwork
  116. if createNewNetwork {
  117. if existingNetwork != nil {
  118. if _, err := existingNetwork.Delete(); err != nil {
  119. return nil, errors.Annotatef(err, "failed to delete existing HNSNetwork %s", networkName)
  120. }
  121. log.Infof("Deleted stale HNSNetwork %s", networkName)
  122. }
  123. expectedNetwork = &hcsshim.HNSNetwork{
  124. Name: networkName,
  125. Type: "L2Bridge",
  126. DNSServerList: cfg.DNSServerList,
  127. Subnets: []hcsshim.Subnet{
  128. {
  129. AddressPrefix: expectedAddressPrefix,
  130. GatewayAddress: expectedGatewayAddress,
  131. },
  132. },
  133. }
  134. jsonRequest, err := json.Marshal(expectedNetwork)
  135. if err != nil {
  136. return nil, errors.Annotatef(err, "failed to marshal %+v", expectedNetwork)
  137. }
  138. log.Infof("Attempting to create HNSNetwork %s", string(jsonRequest))
  139. newNetwork, err := hcsshim.HNSNetworkRequest("POST", "", string(jsonRequest))
  140. if err != nil {
  141. return nil, errors.Annotatef(err, "failed to create HNSNetwork %s", networkName)
  142. }
  143. // Wait for the network to populate Management IP
  144. log.Infof("Waiting to get ManagementIP from HNSNetwork %s", networkName)
  145. waitErr = wait.Poll(500*time.Millisecond, 30*time.Second, func() (done bool, err error) {
  146. newNetwork, lastErr = hcsshim.HNSNetworkRequest("GET", newNetwork.Id, "")
  147. return newNetwork != nil && len(newNetwork.ManagementIP) != 0, nil
  148. })
  149. if waitErr == wait.ErrWaitTimeout {
  150. return nil, errors.Annotatef(waitErr, "timeout, failed to get management IP from HNSNetwork %s", networkName)
  151. }
  152. // Wait for the interface with the management IP
  153. log.Infof("Waiting to get net interface for HNSNetwork %s (%s)", networkName, newNetwork.ManagementIP)
  154. waitErr = wait.Poll(500*time.Millisecond, 5*time.Second, func() (done bool, err error) {
  155. _, lastErr = netshHelper.GetInterfaceByIP(newNetwork.ManagementIP)
  156. return lastErr == nil, nil
  157. })
  158. if waitErr == wait.ErrWaitTimeout {
  159. return nil, errors.Annotatef(lastErr, "timeout, failed to get net interface for HNSNetwork %s (%s)", networkName, newNetwork.ManagementIP)
  160. }
  161. log.Infof("Created HNSNetwork %s", networkName)
  162. expectedNetwork = newNetwork
  163. }
  164. // 5. Ensure a 1.2 endpoint on this network in the host compartment
  165. createNewBridgeEndpoint := true
  166. bridgeEndpointName := networkName + "_ep"
  167. existingBridgeEndpoint, err := hcsshim.GetHNSEndpointByName(bridgeEndpointName)
  168. if err == nil && existingBridgeEndpoint.IPAddress.String() == expectedPodGatewayAddress.String() {
  169. log.Infof("Found existing bridge HNSEndpoint %s", bridgeEndpointName)
  170. createNewBridgeEndpoint = false
  171. }
  172. // 6. Create a bridge HNSEndpoint
  173. expectedBridgeEndpoint := existingBridgeEndpoint
  174. if createNewBridgeEndpoint {
  175. if existingBridgeEndpoint != nil {
  176. if _, err = existingBridgeEndpoint.Delete(); err != nil {
  177. return nil, errors.Annotatef(err, "failed to delete existing bridge HNSEndpoint %s", bridgeEndpointName)
  178. }
  179. log.Infof("Deleted stale bridge HNSEndpoint %s", bridgeEndpointName)
  180. }
  181. expectedBridgeEndpoint = &hcsshim.HNSEndpoint{
  182. Name: bridgeEndpointName,
  183. IPAddress: expectedPodGatewayAddress.ToIP(),
  184. VirtualNetwork: expectedNetwork.Id,
  185. }
  186. log.Infof("Attempting to create bridge HNSEndpoint %+v", expectedBridgeEndpoint)
  187. if expectedBridgeEndpoint, err = expectedBridgeEndpoint.Create(); err != nil {
  188. return nil, errors.Annotatef(err, "failed to create bridge HNSEndpoint %s", bridgeEndpointName)
  189. }
  190. log.Infof("Created bridge HNSEndpoint %s", bridgeEndpointName)
  191. }
  192. // Wait for the bridgeEndpoint to attach to the host
  193. log.Infof("Waiting to attach bridge endpoint %s to host", bridgeEndpointName)
  194. waitErr = wait.Poll(500*time.Millisecond, 5*time.Second, func() (done bool, err error) {
  195. lastErr = expectedBridgeEndpoint.HostAttach(1)
  196. return lastErr == nil, nil
  197. })
  198. if waitErr == wait.ErrWaitTimeout {
  199. return nil, errors.Annotatef(lastErr, "failed to hot attach bridge HNSEndpoint %s to host compartment", bridgeEndpointName)
  200. }
  201. log.Infof("Attached bridge endpoint %s to host successfully", bridgeEndpointName)
  202. // 7. Enable forwarding on the host interface and endpoint
  203. for _, interfaceIpAddress := range []string{expectedNetwork.ManagementIP, expectedBridgeEndpoint.IPAddress.String()} {
  204. netInterface, err := netshHelper.GetInterfaceByIP(interfaceIpAddress)
  205. if err != nil {
  206. return nil, errors.Annotatef(err, "failed to find interface for IP Address %s", interfaceIpAddress)
  207. }
  208. log.Infof("Found %+v interface with IP %s", netInterface, interfaceIpAddress)
  209. // When a new hns network is created, the interface is modified, esp the name, index
  210. if expectedNetwork.ManagementIP == netInterface.IpAddress {
  211. n.LinkIndex = netInterface.Idx
  212. n.Name = netInterface.Name
  213. }
  214. interfaceIdx := strconv.Itoa(netInterface.Idx)
  215. if err := netshHelper.EnableForwarding(interfaceIdx); err != nil {
  216. return nil, errors.Annotatef(err, "failed to enable forwarding on %s index %s", netInterface.Name, interfaceIdx)
  217. }
  218. log.Infof("Enabled forwarding on %s index %s", netInterface.Name, interfaceIdx)
  219. }
  220. return n, nil
  221. }