awsvpc.go 7.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253
  1. // Copyright 2015 CoreOS, Inc.
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package awsvpc
  15. import (
  16. "encoding/json"
  17. "fmt"
  18. "net"
  19. "github.com/coreos/flannel/Godeps/_workspace/src/github.com/aws/aws-sdk-go/aws"
  20. "github.com/coreos/flannel/Godeps/_workspace/src/github.com/aws/aws-sdk-go/aws/awserr"
  21. "github.com/coreos/flannel/Godeps/_workspace/src/github.com/aws/aws-sdk-go/aws/ec2metadata"
  22. "github.com/coreos/flannel/Godeps/_workspace/src/github.com/aws/aws-sdk-go/service/ec2"
  23. log "github.com/coreos/flannel/Godeps/_workspace/src/github.com/golang/glog"
  24. "github.com/coreos/flannel/Godeps/_workspace/src/golang.org/x/net/context"
  25. "github.com/coreos/flannel/backend"
  26. "github.com/coreos/flannel/pkg/ip"
  27. "github.com/coreos/flannel/subnet"
  28. )
  29. type AwsVpcBackend struct {
  30. sm subnet.Manager
  31. publicIP ip.IP4
  32. mtu int
  33. cfg struct {
  34. RouteTableID string
  35. }
  36. lease *subnet.Lease
  37. }
  38. func New(sm subnet.Manager, extIface *net.Interface, extIaddr net.IP, extEaddr net.IP) (backend.Backend, error) {
  39. be := AwsVpcBackend{
  40. sm: sm,
  41. publicIP: ip.FromIP(extEaddr),
  42. mtu: extIface.MTU,
  43. }
  44. return &be, nil
  45. }
  46. func (m *AwsVpcBackend) RegisterNetwork(ctx context.Context, network string, config *subnet.Config) (*backend.SubnetDef, error) {
  47. // Parse our configuration
  48. if len(config.Backend) > 0 {
  49. if err := json.Unmarshal(config.Backend, &m.cfg); err != nil {
  50. return nil, fmt.Errorf("error decoding VPC backend config: %v", err)
  51. }
  52. }
  53. // Acquire the lease form subnet manager
  54. attrs := subnet.LeaseAttrs{
  55. PublicIP: m.publicIP,
  56. }
  57. l, err := m.sm.AcquireLease(ctx, network, &attrs)
  58. switch err {
  59. case nil:
  60. m.lease = l
  61. case context.Canceled, context.DeadlineExceeded:
  62. return nil, err
  63. default:
  64. return nil, fmt.Errorf("failed to acquire lease: %v", err)
  65. }
  66. // Figure out this machine's EC2 instance ID and region
  67. metadataClient := ec2metadata.New(nil)
  68. region, err := metadataClient.Region()
  69. if err != nil {
  70. return nil, fmt.Errorf("error getting EC2 region name: %v", err)
  71. }
  72. instanceID, err := metadataClient.GetMetadata("instance-id")
  73. if err != nil {
  74. return nil, fmt.Errorf("error getting EC2 instance ID: %v", err)
  75. }
  76. ec2c := ec2.New(&aws.Config{Region: aws.String(region)})
  77. if _, err = m.disableSrcDestCheck(instanceID, ec2c); err != nil {
  78. log.Infof("Warning- disabling source destination check failed: %v", err)
  79. }
  80. if m.cfg.RouteTableID == "" {
  81. log.Infof("RouteTableID not passed as config parameter, detecting ...")
  82. if err := m.detectRouteTableID(instanceID, ec2c); err != nil {
  83. return nil, err
  84. }
  85. }
  86. log.Info("RouteRouteTableID: ", m.cfg.RouteTableID)
  87. matchingRouteFound, err := m.checkMatchingRoutes(instanceID, l.Subnet.String(), ec2c)
  88. if err != nil {
  89. log.Errorf("Error describing route tables: %v", err)
  90. if ec2Err, ok := err.(awserr.Error); ok {
  91. if ec2Err.Code() == "UnauthorizedOperation" {
  92. log.Errorf("Note: DescribeRouteTables permission cannot be bound to any resource")
  93. }
  94. }
  95. }
  96. if !matchingRouteFound {
  97. cidrBlock := l.Subnet.String()
  98. deleteRouteInput := &ec2.DeleteRouteInput{RouteTableId: &m.cfg.RouteTableID, DestinationCidrBlock: &cidrBlock}
  99. if _, err := ec2c.DeleteRoute(deleteRouteInput); err != nil {
  100. if ec2err, ok := err.(awserr.Error); !ok || ec2err.Code() != "InvalidRoute.NotFound" {
  101. // an error other than the route not already existing occurred
  102. return nil, fmt.Errorf("error deleting existing route for %s: %v", l.Subnet.String(), err)
  103. }
  104. }
  105. // Add the route for this machine's subnet
  106. if _, err := m.createRoute(instanceID, l.Subnet.String(), ec2c); err != nil {
  107. return nil, fmt.Errorf("unable to add route %s: %v", l.Subnet.String(), err)
  108. }
  109. }
  110. return &backend.SubnetDef{
  111. Lease: l,
  112. MTU: m.mtu,
  113. }, nil
  114. }
  115. func (m *AwsVpcBackend) checkMatchingRoutes(instanceID, subnet string, ec2c *ec2.EC2) (bool, error) {
  116. matchingRouteFound := false
  117. filter := newFilter()
  118. filter.Add("route.destination-cidr-block", subnet)
  119. filter.Add("route.state", "active")
  120. input := ec2.DescribeRouteTablesInput{Filters: filter, RouteTableIds: []*string{&m.cfg.RouteTableID}}
  121. resp, err := ec2c.DescribeRouteTables(&input)
  122. if err != nil {
  123. return matchingRouteFound, err
  124. }
  125. for _, routeTable := range resp.RouteTables {
  126. for _, route := range routeTable.Routes {
  127. if subnet == *route.DestinationCidrBlock && *route.State == "active" {
  128. if *route.InstanceId == instanceID {
  129. matchingRouteFound = true
  130. break
  131. }
  132. log.Errorf("Deleting invalid *active* matching route: %s, %s \n", *route.DestinationCidrBlock, *route.InstanceId)
  133. }
  134. }
  135. }
  136. return matchingRouteFound, nil
  137. }
  138. func (m *AwsVpcBackend) createRoute(instanceID, subnet string, ec2c *ec2.EC2) (*ec2.CreateRouteOutput, error) {
  139. route := &ec2.CreateRouteInput{
  140. RouteTableId: &m.cfg.RouteTableID,
  141. InstanceId: &instanceID,
  142. DestinationCidrBlock: &subnet,
  143. }
  144. return ec2c.CreateRoute(route)
  145. }
  146. func (m *AwsVpcBackend) disableSrcDestCheck(instanceID string, ec2c *ec2.EC2) (*ec2.ModifyInstanceAttributeOutput, error) {
  147. modifyAttributes := &ec2.ModifyInstanceAttributeInput{
  148. InstanceId: aws.String(instanceID),
  149. SourceDestCheck: &ec2.AttributeBooleanValue{Value: aws.Bool(false)},
  150. }
  151. return ec2c.ModifyInstanceAttribute(modifyAttributes)
  152. }
  153. func (m *AwsVpcBackend) detectRouteTableID(instanceID string, ec2c *ec2.EC2) error {
  154. instancesInput := &ec2.DescribeInstancesInput{
  155. InstanceIds: []*string{&instanceID},
  156. }
  157. resp, err := ec2c.DescribeInstances(instancesInput)
  158. if err != nil {
  159. return fmt.Errorf("error getting instance info: %v", err)
  160. }
  161. if len(resp.Reservations) == 0 {
  162. return fmt.Errorf("no reservations found")
  163. }
  164. if len(resp.Reservations[0].Instances) == 0 {
  165. return fmt.Errorf("no matching instance found with id: %v", instanceID)
  166. }
  167. subnetID := resp.Reservations[0].Instances[0].SubnetId
  168. vpcID := resp.Reservations[0].Instances[0].VpcId
  169. log.Info("Subnet-ID: ", *subnetID)
  170. log.Info("VPC-ID: ", *vpcID)
  171. filter := newFilter()
  172. filter.Add("association.subnet-id", *subnetID)
  173. routeTablesInput := &ec2.DescribeRouteTablesInput{
  174. Filters: filter,
  175. }
  176. res, err := ec2c.DescribeRouteTables(routeTablesInput)
  177. if err != nil {
  178. return fmt.Errorf("error describing routeTables for subnetID %s: %v", *subnetID, err)
  179. }
  180. if len(res.RouteTables) != 0 {
  181. m.cfg.RouteTableID = *res.RouteTables[0].RouteTableId
  182. return nil
  183. }
  184. filter = newFilter()
  185. filter.Add("association.main", "true")
  186. filter.Add("vpc-id", *vpcID)
  187. routeTablesInput = &ec2.DescribeRouteTablesInput{
  188. Filters: filter,
  189. }
  190. res, err = ec2c.DescribeRouteTables(routeTablesInput)
  191. if err != nil {
  192. log.Info("error describing route tables: ", err)
  193. }
  194. if len(res.RouteTables) == 0 {
  195. return fmt.Errorf("main route table not found")
  196. }
  197. m.cfg.RouteTableID = *res.RouteTables[0].RouteTableId
  198. return nil
  199. }
  200. func (m *AwsVpcBackend) Run(ctx context.Context) {
  201. }
  202. func (m *AwsVpcBackend) UnregisterNetwork(ctx context.Context, name string) {
  203. }