Skip to content

Commit 6da6c87

Browse files
Merge pull request #17099 from danwinship/egress-ip-fixes-2
Automatic merge from submit-queue. Fix up destination MAC of auto-egress-ip packets Auto egress packets from pods on nodes other than the one with the egress IP were getting dropped. This turns out to be because the packets will be ignored if you output them on tun0 but they don't have tun0's MAC address as the destination MAC. (For local pods, the default route is via tun0, so the MAC is correct, but for remote pods, the default route is via the tun0 on their node, so the MAC was wrong for the node it eventually ended up on.) Also includes two other auto-egress-ip OVS flow fixes. Fixes https://bugzilla.redhat.com/show_bug.cgi?id=1501876 Fixes https://bugzilla.redhat.com/show_bug.cgi?id=1507871
2 parents 92e746a + 63fefef commit 6da6c87

File tree

3 files changed

+17
-5
lines changed

3 files changed

+17
-5
lines changed

pkg/network/node/egressip_test.go

+4-4
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ func TestEgressIP(t *testing.T) {
160160
err = assertFlowChanges(origFlows, flows,
161161
flowChange{
162162
kind: flowAdded,
163-
match: []string{"table=100", "reg0=44", "0xac110066->pkt_mark", "output:2"},
163+
match: []string{"table=100", "reg0=44", "0xac110066->pkt_mark", "goto_table:101"},
164164
},
165165
)
166166
if err != nil {
@@ -195,7 +195,7 @@ func TestEgressIP(t *testing.T) {
195195
err = assertFlowChanges(origFlows, flows,
196196
flowChange{
197197
kind: flowAdded,
198-
match: []string{"table=100", "reg0=45", "0xac110067->pkt_mark", "output:2"},
198+
match: []string{"table=100", "reg0=45", "0xac110067->pkt_mark", "goto_table:101"},
199199
},
200200
)
201201
if err != nil {
@@ -216,7 +216,7 @@ func TestEgressIP(t *testing.T) {
216216
err = assertFlowChanges(origFlows, flows,
217217
flowChange{
218218
kind: flowRemoved,
219-
match: []string{"table=100", "reg0=44", "0xac110066->pkt_mark", "output:2"},
219+
match: []string{"table=100", "reg0=44", "0xac110066->pkt_mark", "goto_table:101"},
220220
},
221221
)
222222
if err != nil {
@@ -262,7 +262,7 @@ func TestEgressIP(t *testing.T) {
262262
err = assertFlowChanges(origFlows, flows,
263263
flowChange{
264264
kind: flowRemoved,
265-
match: []string{"table=100", "reg0=45", "0xac110067->pkt_mark", "output:2"},
265+
match: []string{"table=100", "reg0=45", "0xac110067->pkt_mark", "goto_table:101"},
266266
},
267267
flowChange{
268268
kind: flowAdded,

pkg/network/node/ovscontroller.go

+12-1
Original file line numberDiff line numberDiff line change
@@ -18,13 +18,16 @@ import (
1818

1919
"k8s.io/apimachinery/pkg/util/sets"
2020
kapi "k8s.io/kubernetes/pkg/api"
21+
22+
"github.com/vishvananda/netlink"
2123
)
2224

2325
type ovsController struct {
2426
ovs ovs.Interface
2527
pluginId int
2628
useConnTrack bool
2729
localIP string
30+
tunMAC string
2831
}
2932

3033
const (
@@ -83,6 +86,13 @@ func (oc *ovsController) SetupOVS(clusterNetworkCIDR []string, serviceNetworkCID
8386
if err != nil {
8487
return err
8588
}
89+
if oc.tunMAC == "" {
90+
link, err := netlink.LinkByName(Tun0)
91+
if err != nil {
92+
return err
93+
}
94+
oc.tunMAC = link.Attrs().HardwareAddr.String()
95+
}
8696

8797
otx := oc.ovs.NewTransaction()
8898

@@ -94,6 +104,7 @@ func (oc *ovsController) SetupOVS(clusterNetworkCIDR []string, serviceNetworkCID
94104
for _, clusterCIDR := range clusterNetworkCIDR {
95105
otx.AddFlow("table=0, priority=200, in_port=1, arp, nw_src=%s, nw_dst=%s, actions=move:NXM_NX_TUN_ID[0..31]->NXM_NX_REG0[],goto_table:10", clusterCIDR, localSubnetCIDR)
96106
otx.AddFlow("table=0, priority=200, in_port=1, ip, nw_src=%s, actions=move:NXM_NX_TUN_ID[0..31]->NXM_NX_REG0[],goto_table:10", clusterCIDR)
107+
otx.AddFlow("table=0, priority=200, in_port=1, ip, nw_dst=%s, actions=move:NXM_NX_TUN_ID[0..31]->NXM_NX_REG0[],goto_table:10", clusterCIDR)
97108
}
98109
otx.AddFlow("table=0, priority=150, in_port=1, actions=drop")
99110
// tun0
@@ -693,7 +704,7 @@ func (oc *ovsController) UpdateNamespaceEgressRules(vnid uint32, nodeIP, egressH
693704
otx.AddFlow("table=100, priority=100, reg0=%d, actions=drop", vnid)
694705
} else if nodeIP == oc.localIP {
695706
// Local Egress IP
696-
otx.AddFlow("table=100, priority=100, reg0=%d, ip, actions=set_field:%s->pkt_mark,output:2", vnid, egressHex)
707+
otx.AddFlow("table=100, priority=100, reg0=%d, ip, actions=set_field:%s->eth_dst,set_field:%s->pkt_mark,goto_table:101", vnid, oc.tunMAC, egressHex)
697708
} else {
698709
// Remote Egress IP; send via VXLAN
699710
otx.AddFlow("table=100, priority=100, reg0=%d, ip, actions=move:NXM_NX_REG0[]->NXM_NX_TUN_ID[0..31],set_field:%s->tun_dst,output:1", vnid, nodeIP)

pkg/network/node/ovscontroller_test.go

+1
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ import (
1919
func setupOVSController(t *testing.T) (ovs.Interface, *ovsController, []string) {
2020
ovsif := ovs.NewFake(Br0)
2121
oc := NewOVSController(ovsif, 0, true, "172.17.0.4")
22+
oc.tunMAC = "c6:ac:2c:13:48:4b"
2223
err := oc.SetupOVS([]string{"10.128.0.0/14"}, "172.30.0.0/16", "10.128.0.0/23", "10.128.0.1")
2324
if err != nil {
2425
t.Fatalf("Unexpected error setting up OVS: %v", err)

0 commit comments

Comments
 (0)