
Automatic merge from submit-queue (batch tested with PRs 50294, 50422, 51757, 52379, 52014). If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>.. Azure cloud provider: expose services on non-default subnets **What this PR does / why we need it**: The Azure cloud provider allows users to specify that a service should be exposed on an internal load balancer instead of the default external load balancer. However, in a VNet environment, such services are currently always exposed on the master subnet. Where there are multiple subnets in the VNet, it's desirable to be able to expose an internal service on any subnet. This PR allows this via a new annotation, `service.beta.kubernetes.io/azure-load-balancer-internal-subnet`. **Which issue this PR fixes**: fixes https://github.com/Azure/acs-engine/issues/1296 (no corresponding issue has been raised in the k8s core repo) **Special notes for your reviewer**: None **Release note**: ```release-note A new service annotation has been added for services of type LoadBalancer on Azure, to specify the subnet on which the service's front end IP should be provisioned. The annotation is service.beta.kubernetes.io/azure-load-balancer-internal-subnet and its value is the subnet name (not the subnet ARM ID). If omitted, the default is the master subnet. It is ignored if the service is not on Azure, if the type is not LoadBalancer, or if the load balancer is not internal. ```
368 lines
12 KiB
Go
368 lines
12 KiB
Go
/*
|
|
Copyright 2016 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package azure
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"hash/crc32"
|
|
"regexp"
|
|
"strconv"
|
|
"strings"
|
|
|
|
"k8s.io/api/core/v1"
|
|
"k8s.io/kubernetes/pkg/cloudprovider"
|
|
|
|
"github.com/Azure/azure-sdk-for-go/arm/compute"
|
|
"github.com/Azure/azure-sdk-for-go/arm/network"
|
|
"github.com/golang/glog"
|
|
"k8s.io/apimachinery/pkg/types"
|
|
)
|
|
|
|
const (
|
|
loadBalancerMinimumPriority = 500
|
|
loadBalancerMaximumPriority = 4096
|
|
|
|
machineIDTemplate = "/subscriptions/%s/resourceGroups/%s/providers/Microsoft.Compute/virtualMachines/%s"
|
|
availabilitySetIDTemplate = "/subscriptions/%s/resourceGroups/%s/providers/Microsoft.Compute/availabilitySets/%s"
|
|
frontendIPConfigIDTemplate = "/subscriptions/%s/resourceGroups/%s/providers/Microsoft.Network/loadBalancers/%s/frontendIPConfigurations/%s"
|
|
backendPoolIDTemplate = "/subscriptions/%s/resourceGroups/%s/providers/Microsoft.Network/loadBalancers/%s/backendAddressPools/%s"
|
|
loadBalancerRuleIDTemplate = "/subscriptions/%s/resourceGroups/%s/providers/Microsoft.Network/loadBalancers/%s/loadBalancingRules/%s"
|
|
loadBalancerProbeIDTemplate = "/subscriptions/%s/resourceGroups/%s/providers/Microsoft.Network/loadBalancers/%s/probes/%s"
|
|
securityRuleIDTemplate = "/subscriptions/%s/resourceGroups/%s/providers/Microsoft.Network/networkSecurityGroups/%s/securityRules/%s"
|
|
)
|
|
|
|
var providerIDRE = regexp.MustCompile(`^` + CloudProviderName + `://(?:.*)/Microsoft.Compute/virtualMachines/(.+)$`)
|
|
|
|
// returns the full identifier of a machine
|
|
func (az *Cloud) getMachineID(machineName string) string {
|
|
return fmt.Sprintf(
|
|
machineIDTemplate,
|
|
az.SubscriptionID,
|
|
az.ResourceGroup,
|
|
machineName)
|
|
}
|
|
|
|
// returns the full identifier of an availabilitySet
|
|
func (az *Cloud) getAvailabilitySetID(availabilitySetName string) string {
|
|
return fmt.Sprintf(
|
|
availabilitySetIDTemplate,
|
|
az.SubscriptionID,
|
|
az.ResourceGroup,
|
|
availabilitySetName)
|
|
}
|
|
|
|
// returns the full identifier of a loadbalancer frontendipconfiguration.
|
|
func (az *Cloud) getFrontendIPConfigID(lbName, backendPoolName string) string {
|
|
return fmt.Sprintf(
|
|
frontendIPConfigIDTemplate,
|
|
az.SubscriptionID,
|
|
az.ResourceGroup,
|
|
lbName,
|
|
backendPoolName)
|
|
}
|
|
|
|
// returns the full identifier of a loadbalancer backendpool.
|
|
func (az *Cloud) getBackendPoolID(lbName, backendPoolName string) string {
|
|
return fmt.Sprintf(
|
|
backendPoolIDTemplate,
|
|
az.SubscriptionID,
|
|
az.ResourceGroup,
|
|
lbName,
|
|
backendPoolName)
|
|
}
|
|
|
|
// returns the full identifier of a loadbalancer rule.
|
|
func (az *Cloud) getLoadBalancerRuleID(lbName, lbRuleName string) string {
|
|
return fmt.Sprintf(
|
|
loadBalancerRuleIDTemplate,
|
|
az.SubscriptionID,
|
|
az.ResourceGroup,
|
|
lbName,
|
|
lbRuleName)
|
|
}
|
|
|
|
// returns the full identifier of a loadbalancer probe.
|
|
func (az *Cloud) getLoadBalancerProbeID(lbName, lbRuleName string) string {
|
|
return fmt.Sprintf(
|
|
loadBalancerProbeIDTemplate,
|
|
az.SubscriptionID,
|
|
az.ResourceGroup,
|
|
lbName,
|
|
lbRuleName)
|
|
}
|
|
|
|
// returns the full identifier of a network security group security rule.
|
|
func (az *Cloud) getSecurityRuleID(securityRuleName string) string {
|
|
return fmt.Sprintf(
|
|
securityRuleIDTemplate,
|
|
az.SubscriptionID,
|
|
az.ResourceGroup,
|
|
az.SecurityGroupName,
|
|
securityRuleName)
|
|
}
|
|
|
|
// returns the deepest child's identifier from a full identifier string.
|
|
func getLastSegment(ID string) (string, error) {
|
|
parts := strings.Split(ID, "/")
|
|
name := parts[len(parts)-1]
|
|
if len(name) == 0 {
|
|
return "", fmt.Errorf("resource name was missing from identifier")
|
|
}
|
|
|
|
return name, nil
|
|
}
|
|
|
|
// returns the equivalent LoadBalancerRule, SecurityRule and LoadBalancerProbe
|
|
// protocol types for the given Kubernetes protocol type.
|
|
func getProtocolsFromKubernetesProtocol(protocol v1.Protocol) (*network.TransportProtocol, *network.SecurityRuleProtocol, *network.ProbeProtocol, error) {
|
|
var transportProto network.TransportProtocol
|
|
var securityProto network.SecurityRuleProtocol
|
|
var probeProto network.ProbeProtocol
|
|
|
|
switch protocol {
|
|
case v1.ProtocolTCP:
|
|
transportProto = network.TransportProtocolTCP
|
|
securityProto = network.SecurityRuleProtocolTCP
|
|
probeProto = network.ProbeProtocolTCP
|
|
return &transportProto, &securityProto, &probeProto, nil
|
|
case v1.ProtocolUDP:
|
|
transportProto = network.TransportProtocolUDP
|
|
securityProto = network.SecurityRuleProtocolUDP
|
|
return &transportProto, &securityProto, nil, nil
|
|
default:
|
|
return &transportProto, &securityProto, &probeProto, fmt.Errorf("Only TCP and UDP are supported for Azure LoadBalancers")
|
|
}
|
|
|
|
}
|
|
|
|
// This returns the full identifier of the primary NIC for the given VM.
|
|
func getPrimaryInterfaceID(machine compute.VirtualMachine) (string, error) {
|
|
if len(*machine.NetworkProfile.NetworkInterfaces) == 1 {
|
|
return *(*machine.NetworkProfile.NetworkInterfaces)[0].ID, nil
|
|
}
|
|
|
|
for _, ref := range *machine.NetworkProfile.NetworkInterfaces {
|
|
if *ref.Primary {
|
|
return *ref.ID, nil
|
|
}
|
|
}
|
|
|
|
return "", fmt.Errorf("failed to find a primary nic for the vm. vmname=%q", *machine.Name)
|
|
}
|
|
|
|
func getPrimaryIPConfig(nic network.Interface) (*network.InterfaceIPConfiguration, error) {
|
|
if len(*nic.IPConfigurations) == 1 {
|
|
return &((*nic.IPConfigurations)[0]), nil
|
|
}
|
|
|
|
for _, ref := range *nic.IPConfigurations {
|
|
if *ref.Primary {
|
|
return &ref, nil
|
|
}
|
|
}
|
|
|
|
return nil, fmt.Errorf("failed to determine the determine primary ipconfig. nicname=%q", *nic.Name)
|
|
}
|
|
|
|
// For a load balancer, all frontend ip should reference either a subnet or publicIpAddress.
|
|
// Thus Azure do not allow mixed type (public and internal) load balancer.
|
|
// So we'd have a separate name for internal load balancer.
|
|
// This would be the name for Azure LoadBalancer resource.
|
|
func getLoadBalancerName(clusterName string, isInternal bool) string {
|
|
if isInternal {
|
|
return fmt.Sprintf("%s-internal", clusterName)
|
|
}
|
|
|
|
return clusterName
|
|
}
|
|
|
|
func getBackendPoolName(clusterName string) string {
|
|
return clusterName
|
|
}
|
|
|
|
func getLoadBalancerRuleName(service *v1.Service, port v1.ServicePort, subnetName *string) string {
|
|
if subnetName == nil {
|
|
return fmt.Sprintf("%s-%s-%d", getRulePrefix(service), port.Protocol, port.Port)
|
|
}
|
|
return fmt.Sprintf("%s-%s-%s-%d", getRulePrefix(service), *subnetName, port.Protocol, port.Port)
|
|
}
|
|
|
|
func getSecurityRuleName(service *v1.Service, port v1.ServicePort, sourceAddrPrefix string) string {
|
|
safePrefix := strings.Replace(sourceAddrPrefix, "/", "_", -1)
|
|
return fmt.Sprintf("%s-%s-%d-%s", getRulePrefix(service), port.Protocol, port.Port, safePrefix)
|
|
}
|
|
|
|
// This returns a human-readable version of the Service used to tag some resources.
|
|
// This is only used for human-readable convenience, and not to filter.
|
|
func getServiceName(service *v1.Service) string {
|
|
return fmt.Sprintf("%s/%s", service.Namespace, service.Name)
|
|
}
|
|
|
|
// This returns a prefix for loadbalancer/security rules.
|
|
func getRulePrefix(service *v1.Service) string {
|
|
return cloudprovider.GetLoadBalancerName(service)
|
|
}
|
|
|
|
func getPublicIPName(clusterName string, service *v1.Service) string {
|
|
return fmt.Sprintf("%s-%s", clusterName, cloudprovider.GetLoadBalancerName(service))
|
|
}
|
|
|
|
func serviceOwnsRule(service *v1.Service, rule string) bool {
|
|
prefix := getRulePrefix(service)
|
|
return strings.HasPrefix(strings.ToUpper(rule), strings.ToUpper(prefix))
|
|
}
|
|
|
|
func serviceOwnsFrontendIP(fip network.FrontendIPConfiguration, service *v1.Service) bool {
|
|
baseName := cloudprovider.GetLoadBalancerName(service)
|
|
return strings.HasPrefix(*fip.Name, baseName)
|
|
}
|
|
|
|
func getFrontendIPConfigName(service *v1.Service, subnetName *string) string {
|
|
baseName := cloudprovider.GetLoadBalancerName(service)
|
|
if subnetName != nil {
|
|
return fmt.Sprintf("%s-%s", baseName, *subnetName)
|
|
}
|
|
return baseName
|
|
}
|
|
|
|
// This returns the next available rule priority level for a given set of security rules.
|
|
func getNextAvailablePriority(rules []network.SecurityRule) (int32, error) {
|
|
var smallest int32 = loadBalancerMinimumPriority
|
|
var spread int32 = 1
|
|
|
|
outer:
|
|
for smallest < loadBalancerMaximumPriority {
|
|
for _, rule := range rules {
|
|
if *rule.Priority == smallest {
|
|
smallest += spread
|
|
continue outer
|
|
}
|
|
}
|
|
// no one else had it
|
|
return smallest, nil
|
|
}
|
|
|
|
return -1, fmt.Errorf("SecurityGroup priorities are exhausted")
|
|
}
|
|
|
|
func (az *Cloud) getIPForMachine(nodeName types.NodeName) (string, error) {
|
|
az.operationPollRateLimiter.Accept()
|
|
machine, exists, err := az.getVirtualMachine(nodeName)
|
|
if !exists {
|
|
return "", cloudprovider.InstanceNotFound
|
|
}
|
|
if err != nil {
|
|
glog.Errorf("error: az.getIPForMachine(%s), az.getVirtualMachine(%s), err=%v", nodeName, nodeName, err)
|
|
return "", err
|
|
}
|
|
|
|
nicID, err := getPrimaryInterfaceID(machine)
|
|
if err != nil {
|
|
glog.Errorf("error: az.getIPForMachine(%s), getPrimaryInterfaceID(%v), err=%v", nodeName, machine, err)
|
|
return "", err
|
|
}
|
|
|
|
nicName, err := getLastSegment(nicID)
|
|
if err != nil {
|
|
glog.Errorf("error: az.getIPForMachine(%s), getLastSegment(%s), err=%v", nodeName, nicID, err)
|
|
return "", err
|
|
}
|
|
|
|
az.operationPollRateLimiter.Accept()
|
|
glog.V(10).Infof("InterfacesClient.Get(%q): start", nicName)
|
|
nic, err := az.InterfacesClient.Get(az.ResourceGroup, nicName, "")
|
|
glog.V(10).Infof("InterfacesClient.Get(%q): end", nicName)
|
|
if err != nil {
|
|
glog.Errorf("error: az.getIPForMachine(%s), az.InterfacesClient.Get(%s, %s, %s), err=%v", nodeName, az.ResourceGroup, nicName, "", err)
|
|
return "", err
|
|
}
|
|
|
|
ipConfig, err := getPrimaryIPConfig(nic)
|
|
if err != nil {
|
|
glog.Errorf("error: az.getIPForMachine(%s), getPrimaryIPConfig(%v), err=%v", nodeName, nic, err)
|
|
return "", err
|
|
}
|
|
|
|
targetIP := *ipConfig.PrivateIPAddress
|
|
return targetIP, nil
|
|
}
|
|
|
|
// splitProviderID converts a providerID to a NodeName.
|
|
func splitProviderID(providerID string) (types.NodeName, error) {
|
|
matches := providerIDRE.FindStringSubmatch(providerID)
|
|
if len(matches) != 2 {
|
|
return "", errors.New("error splitting providerID")
|
|
}
|
|
return types.NodeName(matches[1]), nil
|
|
}
|
|
|
|
var polyTable = crc32.MakeTable(crc32.Koopman)
|
|
|
|
//MakeCRC32 : convert string to CRC32 format
|
|
func MakeCRC32(str string) string {
|
|
crc := crc32.New(polyTable)
|
|
crc.Write([]byte(str))
|
|
hash := crc.Sum32()
|
|
return strconv.FormatUint(uint64(hash), 10)
|
|
}
|
|
|
|
//ExtractVMData : extract dataDisks, storageProfile from a map struct
|
|
func ExtractVMData(vmData map[string]interface{}) (dataDisks []interface{},
|
|
storageProfile map[string]interface{},
|
|
hardwareProfile map[string]interface{}, err error) {
|
|
props, ok := vmData["properties"].(map[string]interface{})
|
|
if !ok {
|
|
return nil, nil, nil, fmt.Errorf("convert vmData(properties) to map error")
|
|
}
|
|
|
|
storageProfile, ok = props["storageProfile"].(map[string]interface{})
|
|
if !ok {
|
|
return nil, nil, nil, fmt.Errorf("convert vmData(storageProfile) to map error")
|
|
}
|
|
|
|
hardwareProfile, ok = props["hardwareProfile"].(map[string]interface{})
|
|
if !ok {
|
|
return nil, nil, nil, fmt.Errorf("convert vmData(hardwareProfile) to map error")
|
|
}
|
|
|
|
dataDisks, ok = storageProfile["dataDisks"].([]interface{})
|
|
if !ok {
|
|
return nil, nil, nil, fmt.Errorf("convert vmData(dataDisks) to map error")
|
|
}
|
|
return dataDisks, storageProfile, hardwareProfile, nil
|
|
}
|
|
|
|
//ExtractDiskData : extract provisioningState, diskState from a map struct
|
|
func ExtractDiskData(diskData interface{}) (provisioningState string, diskState string, err error) {
|
|
fragment, ok := diskData.(map[string]interface{})
|
|
if !ok {
|
|
return "", "", fmt.Errorf("convert diskData to map error")
|
|
}
|
|
|
|
properties, ok := fragment["properties"].(map[string]interface{})
|
|
if !ok {
|
|
return "", "", fmt.Errorf("convert diskData(properties) to map error")
|
|
}
|
|
|
|
provisioningState, ok = properties["provisioningState"].(string) // if there is a disk, provisioningState property will be there
|
|
if ref, ok := properties["diskState"]; ok {
|
|
diskState = ref.(string)
|
|
}
|
|
return provisioningState, diskState, nil
|
|
}
|