Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Controller support for ExternalEntity in Antrea NetworkPolicy #1084

Merged
merged 6 commits into from
Sep 10, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 12 additions & 0 deletions build/yamls/antrea-aks.yml
Original file line number Diff line number Diff line change
Expand Up @@ -283,6 +283,8 @@ spec:
to:
items:
properties:
externalEntitySelector:
x-kubernetes-preserve-unknown-fields: true
ipBlock:
properties:
cidr:
Expand All @@ -308,6 +310,8 @@ spec:
from:
items:
properties:
externalEntitySelector:
x-kubernetes-preserve-unknown-fields: true
ipBlock:
properties:
cidr:
Expand Down Expand Up @@ -804,6 +808,14 @@ rules:
- patch
- create
- delete
- apiGroups:
- core.antrea.tanzu.vmware.com
resources:
- externalentities
verbs:
- get
- watch
- list
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
Expand Down
12 changes: 12 additions & 0 deletions build/yamls/antrea-eks.yml
Original file line number Diff line number Diff line change
Expand Up @@ -283,6 +283,8 @@ spec:
to:
items:
properties:
externalEntitySelector:
x-kubernetes-preserve-unknown-fields: true
ipBlock:
properties:
cidr:
Expand All @@ -308,6 +310,8 @@ spec:
from:
items:
properties:
externalEntitySelector:
x-kubernetes-preserve-unknown-fields: true
ipBlock:
properties:
cidr:
Expand Down Expand Up @@ -804,6 +808,14 @@ rules:
- patch
- create
- delete
- apiGroups:
- core.antrea.tanzu.vmware.com
resources:
- externalentities
verbs:
- get
- watch
- list
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
Expand Down
12 changes: 12 additions & 0 deletions build/yamls/antrea-gke.yml
Original file line number Diff line number Diff line change
Expand Up @@ -283,6 +283,8 @@ spec:
to:
items:
properties:
externalEntitySelector:
x-kubernetes-preserve-unknown-fields: true
ipBlock:
properties:
cidr:
Expand All @@ -308,6 +310,8 @@ spec:
from:
items:
properties:
externalEntitySelector:
x-kubernetes-preserve-unknown-fields: true
ipBlock:
properties:
cidr:
Expand Down Expand Up @@ -804,6 +808,14 @@ rules:
- patch
- create
- delete
- apiGroups:
- core.antrea.tanzu.vmware.com
resources:
- externalentities
verbs:
- get
- watch
- list
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
Expand Down
12 changes: 12 additions & 0 deletions build/yamls/antrea-ipsec.yml
Original file line number Diff line number Diff line change
Expand Up @@ -283,6 +283,8 @@ spec:
to:
items:
properties:
externalEntitySelector:
x-kubernetes-preserve-unknown-fields: true
ipBlock:
properties:
cidr:
Expand All @@ -308,6 +310,8 @@ spec:
from:
items:
properties:
externalEntitySelector:
x-kubernetes-preserve-unknown-fields: true
ipBlock:
properties:
cidr:
Expand Down Expand Up @@ -804,6 +808,14 @@ rules:
- patch
- create
- delete
- apiGroups:
- core.antrea.tanzu.vmware.com
resources:
- externalentities
verbs:
- get
- watch
- list
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
Expand Down
12 changes: 12 additions & 0 deletions build/yamls/antrea.yml
Original file line number Diff line number Diff line change
Expand Up @@ -283,6 +283,8 @@ spec:
to:
items:
properties:
externalEntitySelector:
x-kubernetes-preserve-unknown-fields: true
ipBlock:
properties:
cidr:
Expand All @@ -308,6 +310,8 @@ spec:
from:
items:
properties:
externalEntitySelector:
x-kubernetes-preserve-unknown-fields: true
ipBlock:
properties:
cidr:
Expand Down Expand Up @@ -804,6 +808,14 @@ rules:
- patch
- create
- delete
- apiGroups:
- core.antrea.tanzu.vmware.com
resources:
- externalentities
verbs:
- get
- watch
- list
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
Expand Down
8 changes: 8 additions & 0 deletions build/yamls/base/controller-rbac.yml
Original file line number Diff line number Diff line change
Expand Up @@ -123,6 +123,14 @@ rules:
- patch
- create
- delete
- apiGroups:
- core.antrea.tanzu.vmware.com
resources:
- externalentities
verbs:
- get
- watch
- list
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
Expand Down
4 changes: 4 additions & 0 deletions build/yamls/base/crds.yml
Original file line number Diff line number Diff line change
Expand Up @@ -427,6 +427,8 @@ spec:
x-kubernetes-preserve-unknown-fields: true
namespaceSelector:
x-kubernetes-preserve-unknown-fields: true
externalEntitySelector:
x-kubernetes-preserve-unknown-fields: true
ipBlock:
type: object
properties:
Expand Down Expand Up @@ -462,6 +464,8 @@ spec:
x-kubernetes-preserve-unknown-fields: true
namespaceSelector:
x-kubernetes-preserve-unknown-fields: true
externalEntitySelector:
x-kubernetes-preserve-unknown-fields: true
ipBlock:
type: object
properties:
Expand Down
2 changes: 2 additions & 0 deletions cmd/antrea-controller/controller.go
Original file line number Diff line number Diff line change
Expand Up @@ -84,6 +84,7 @@ func run(o *Options) error {
networkPolicyInformer := informerFactory.Networking().V1().NetworkPolicies()
nodeInformer := informerFactory.Core().V1().Nodes()
cnpInformer := crdInformerFactory.Security().V1alpha1().ClusterNetworkPolicies()
externalEntityInformer := crdInformerFactory.Core().V1alpha1().ExternalEntities()
anpInformer := crdInformerFactory.Security().V1alpha1().NetworkPolicies()
traceflowInformer := crdInformerFactory.Ops().V1alpha1().Traceflows()

Expand All @@ -96,6 +97,7 @@ func run(o *Options) error {
crdClient,
podInformer,
namespaceInformer,
externalEntityInformer,
networkPolicyInformer,
cnpInformer,
anpInformer,
Expand Down
64 changes: 41 additions & 23 deletions pkg/agent/controller/networkpolicy/cache.go
Original file line number Diff line number Diff line change
Expand Up @@ -93,10 +93,10 @@ func hashRule(r *rule) string {
// It's the struct used by reconciler.
type CompletedRule struct {
*rule
// Source Pods of this rule, can't coexist with ToAddresses.
FromAddresses v1beta1.GroupMemberPodSet
// Destination Pods of this rule, can't coexist with FromAddresses.
ToAddresses v1beta1.GroupMemberPodSet
// Source GroupMembers of this rule, can't coexist with ToAddresses.
FromAddresses v1beta1.GroupMemberSet
// Destination GroupMembers of this rule, can't coexist with FromAddresses.
ToAddresses v1beta1.GroupMemberSet
// Target Pods of this rule.
Pods v1beta1.GroupMemberPodSet
}
Expand Down Expand Up @@ -128,8 +128,8 @@ type ruleCache struct {

addressSetLock sync.RWMutex
// addressSetByGroup stores the AddressGroup members.
// It is a mapping from group name to a set of Pods.
addressSetByGroup map[string]v1beta1.GroupMemberPodSet
// It is a mapping from group name to a set of GroupMembers.
addressSetByGroup map[string]v1beta1.GroupMemberSet

policyMapLock sync.RWMutex
// policyMap is a map using NetworkPolicy UID as the key.
Expand Down Expand Up @@ -252,14 +252,21 @@ func (c *ruleCache) GetAddressGroups() []v1beta1.AddressGroup {
var ret []v1beta1.AddressGroup
c.addressSetLock.RLock()
defer c.addressSetLock.RUnlock()

for k, v := range c.addressSetByGroup {
var pods []v1beta1.GroupMemberPod
for _, pod := range v {
pods = append(pods, *pod)
var groupMembers []v1beta1.GroupMember
for _, member := range v {
if member.Pod != nil {
pods = append(pods, *member.ToGroupMemberPod())
} else if member.ExternalEntity != nil {
groupMembers = append(groupMembers, *member)
}
}
ret = append(ret, v1beta1.AddressGroup{
ObjectMeta: metav1.ObjectMeta{Name: k},
Pods: pods,
ObjectMeta: metav1.ObjectMeta{Name: k},
Pods: pods,
GroupMembers: groupMembers,
})
}
return ret
Expand Down Expand Up @@ -320,7 +327,7 @@ func newRuleCache(dirtyRuleHandler func(string), podUpdate <-chan v1beta1.PodRef
)
cache := &ruleCache{
podSetByGroup: make(map[string]v1beta1.GroupMemberPodSet),
addressSetByGroup: make(map[string]v1beta1.GroupMemberPodSet),
addressSetByGroup: make(map[string]v1beta1.GroupMemberSet),
policyMap: make(map[string]*types.NamespacedName),
rules: rules,
dirtyRuleHandler: dirtyRuleHandler,
Expand Down Expand Up @@ -398,19 +405,23 @@ func (c *ruleCache) AddAddressGroup(group *v1beta1.AddressGroup) error {
}

func (c *ruleCache) addAddressGroupLocked(group *v1beta1.AddressGroup) error {
podSet := v1beta1.GroupMemberPodSet{}
groupMemberSet := v1beta1.GroupMemberSet{}
for i := range group.Pods {
// Must not store address of loop iterator variable as it's the same
// address taking different values in each loop iteration, otherwise
// podSet would eventually contain only the last value.
// groupMemberSet would eventually contain only the last value.
// https://github.com/golang/go/wiki/CommonMistakes#using-reference-to-loop-iterator-variable
podSet.Insert(&group.Pods[i])
groupMemberSet.Insert(group.Pods[i].ToGroupMember())
}
oldPodSet, exists := c.addressSetByGroup[group.Name]
if exists && oldPodSet.Equal(podSet) {
for i := range group.GroupMembers {
groupMemberSet.Insert(&group.GroupMembers[i])
}

oldGroupMemberSet, exists := c.addressSetByGroup[group.Name]
if exists && oldGroupMemberSet.Equal(groupMemberSet) {
return nil
}
c.addressSetByGroup[group.Name] = podSet
c.addressSetByGroup[group.Name] = groupMemberSet
c.onAddressGroupUpdate(group.Name)
return nil
}
Expand All @@ -421,16 +432,23 @@ func (c *ruleCache) PatchAddressGroup(patch *v1beta1.AddressGroupPatch) error {
c.addressSetLock.Lock()
defer c.addressSetLock.Unlock()

podSet, exists := c.addressSetByGroup[patch.Name]
groupMemberSet, exists := c.addressSetByGroup[patch.Name]
if !exists {
return fmt.Errorf("AddressGroup %v doesn't exist in cache, can't be patched", patch.Name)
}
for i := range patch.AddedPods {
podSet.Insert(&patch.AddedPods[i])
groupMemberSet.Insert(patch.AddedPods[i].ToGroupMember())
}
for i := range patch.RemovedPods {
podSet.Delete(&patch.RemovedPods[i])
groupMemberSet.Delete(patch.RemovedPods[i].ToGroupMember())
}
for i := range patch.AddedGroupMembers {
groupMemberSet.Insert(&patch.AddedGroupMembers[i])
}
for i := range patch.RemovedGroupMembers {
groupMemberSet.Delete(&patch.RemovedGroupMembers[i])
}

c.onAddressGroupUpdate(patch.Name)
return nil
}
Expand Down Expand Up @@ -680,7 +698,7 @@ func (c *ruleCache) GetCompletedRule(ruleID string) (completedRule *CompletedRul
}

r := obj.(*rule)
var fromAddresses, toAddresses v1beta1.GroupMemberPodSet
var fromAddresses, toAddresses v1beta1.GroupMemberSet
if r.Direction == v1beta1.DirectionIn {
fromAddresses, completed = c.unionAddressGroups(r.From.AddressGroups)
} else {
Expand Down Expand Up @@ -725,11 +743,11 @@ func (c *ruleCache) onAddressGroupUpdate(groupName string) {
// unionAddressGroups gets the union of addresses of the provided address groups.
// If any group is not found, nil and false will be returned to indicate the
// set is not complete yet.
func (c *ruleCache) unionAddressGroups(groupNames []string) (v1beta1.GroupMemberPodSet, bool) {
func (c *ruleCache) unionAddressGroups(groupNames []string) (v1beta1.GroupMemberSet, bool) {
c.addressSetLock.RLock()
defer c.addressSetLock.RUnlock()

set := v1beta1.NewGroupMemberPodSet()
set := v1beta1.NewGroupMemberSet()
for _, groupName := range groupNames {
curSet, exists := c.addressSetByGroup[groupName]
if !exists {
Expand Down
Loading