mirror of
https://github.com/rancher/plugins.git
synced 2025-09-25 10:18:56 +00:00
This enables the keep_addr_on_down sysctl parameter for IPV6 addresses configured via the ConfigureIface function. This prevents IPAM confiuration to be lost when users need to refresh the link state of an interface that has IPV6 addresses. Signed-off-by: Marcelo Guerrero <marguerr@redhat.com>
157 lines
4.5 KiB
Go
157 lines
4.5 KiB
Go
// Copyright 2015 CNI authors
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package ipam
|
|
|
|
import (
|
|
"fmt"
|
|
"net"
|
|
"os"
|
|
|
|
"github.com/vishvananda/netlink"
|
|
|
|
current "github.com/containernetworking/cni/pkg/types/100"
|
|
"github.com/containernetworking/plugins/pkg/ip"
|
|
"github.com/containernetworking/plugins/pkg/netlinksafe"
|
|
"github.com/containernetworking/plugins/pkg/utils/sysctl"
|
|
)
|
|
|
|
const (
|
|
// Note: use slash as separator so we can have dots in interface name (VLANs)
|
|
DisableIPv6SysctlTemplate = "net/ipv6/conf/%s/disable_ipv6"
|
|
KeepAddrOnDownSysctlTemplate = "net/ipv6/conf/%s/keep_addr_on_down"
|
|
)
|
|
|
|
// ConfigureIface takes the result of IPAM plugin and
|
|
// applies to the ifName interface
|
|
func ConfigureIface(ifName string, res *current.Result) error {
|
|
if len(res.Interfaces) == 0 {
|
|
return fmt.Errorf("no interfaces to configure")
|
|
}
|
|
|
|
link, err := netlinksafe.LinkByName(ifName)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to lookup %q: %v", ifName, err)
|
|
}
|
|
|
|
var v4gw, v6gw net.IP
|
|
hasEnabledIpv6 := false
|
|
for _, ipc := range res.IPs {
|
|
if ipc.Interface == nil {
|
|
continue
|
|
}
|
|
intIdx := *ipc.Interface
|
|
if intIdx < 0 || intIdx >= len(res.Interfaces) || res.Interfaces[intIdx].Name != ifName {
|
|
// IP address is for a different interface
|
|
return fmt.Errorf("failed to add IP addr %v to %q: invalid interface index", ipc, ifName)
|
|
}
|
|
|
|
// Make sure sysctl "disable_ipv6" is 0 and "keep_addr_on_down" is 1
|
|
// if we are about to add an IPv6 address to the interface
|
|
if !hasEnabledIpv6 && ipc.Address.IP.To4() == nil {
|
|
// Enabled IPv6 for loopback "lo" and the interface
|
|
// being configured
|
|
for _, iface := range [2]string{"lo", ifName} {
|
|
ipv6SysctlValueName := fmt.Sprintf(DisableIPv6SysctlTemplate, iface)
|
|
|
|
// Read current sysctl value
|
|
value, err := sysctl.Sysctl(ipv6SysctlValueName)
|
|
if err != nil {
|
|
fmt.Fprintf(os.Stderr, "ipam_linux: failed to read sysctl %q: %v\n", ipv6SysctlValueName, err)
|
|
continue
|
|
}
|
|
if value == "0" {
|
|
continue
|
|
}
|
|
|
|
// Write sysctl to enable IPv6
|
|
_, err = sysctl.Sysctl(ipv6SysctlValueName, "0")
|
|
if err != nil {
|
|
return fmt.Errorf("failed to enable IPv6 for interface %q (%s=%s): %v", iface, ipv6SysctlValueName, value, err)
|
|
}
|
|
}
|
|
|
|
// Enable "keep_addr_on_down" for the interface being configured
|
|
// This prevents the kernel from removing the address when the interface is brought down
|
|
keepAddrOnDownSysctlValueName := fmt.Sprintf(KeepAddrOnDownSysctlTemplate, ifName)
|
|
_, err = sysctl.Sysctl(keepAddrOnDownSysctlValueName, "1")
|
|
if err != nil {
|
|
return fmt.Errorf("failed to enable keep_addr_on_down for interface %q: %v", ifName, err)
|
|
}
|
|
|
|
hasEnabledIpv6 = true
|
|
}
|
|
|
|
addr := &netlink.Addr{IPNet: &ipc.Address, Label: ""}
|
|
if err = netlink.AddrAdd(link, addr); err != nil {
|
|
return fmt.Errorf("failed to add IP addr %v to %q: %v", ipc, ifName, err)
|
|
}
|
|
|
|
gwIsV4 := ipc.Gateway.To4() != nil
|
|
if gwIsV4 && v4gw == nil {
|
|
v4gw = ipc.Gateway
|
|
} else if !gwIsV4 && v6gw == nil {
|
|
v6gw = ipc.Gateway
|
|
}
|
|
}
|
|
|
|
if err := netlink.LinkSetUp(link); err != nil {
|
|
return fmt.Errorf("failed to set %q UP: %v", ifName, err)
|
|
}
|
|
|
|
if v6gw != nil {
|
|
ip.SettleAddresses(ifName, 10)
|
|
}
|
|
|
|
for _, r := range res.Routes {
|
|
routeIsV4 := r.Dst.IP.To4() != nil
|
|
gw := r.GW
|
|
if gw == nil {
|
|
if routeIsV4 && v4gw != nil {
|
|
gw = v4gw
|
|
} else if !routeIsV4 && v6gw != nil {
|
|
gw = v6gw
|
|
}
|
|
}
|
|
route := netlink.Route{
|
|
Dst: &r.Dst,
|
|
LinkIndex: link.Attrs().Index,
|
|
Gw: gw,
|
|
Priority: r.Priority,
|
|
}
|
|
|
|
if r.Table != nil {
|
|
route.Table = *r.Table
|
|
}
|
|
|
|
if r.Scope != nil {
|
|
route.Scope = netlink.Scope(*r.Scope)
|
|
}
|
|
|
|
if r.Table != nil {
|
|
route.Table = *r.Table
|
|
}
|
|
|
|
if r.Scope != nil {
|
|
route.Scope = netlink.Scope(*r.Scope)
|
|
}
|
|
|
|
if err = netlink.RouteAddEcmp(&route); err != nil {
|
|
return fmt.Errorf("failed to add route '%v via %v dev %v metric %d (Scope: %v, Table: %d)': %v", r.Dst, gw, ifName, r.Priority, route.Scope, route.Table, err)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|