2018-04-22 01:51:58 +00:00
|
|
|
/*
|
|
|
|
Copyright 2018 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package controller
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"net"
|
|
|
|
"reflect"
|
2018-09-09 19:34:18 +00:00
|
|
|
"strconv"
|
2020-12-13 14:46:13 +00:00
|
|
|
"strings"
|
2018-04-22 01:51:58 +00:00
|
|
|
|
2021-09-07 18:15:16 +00:00
|
|
|
"k8s.io/apimachinery/pkg/util/intstr"
|
2019-10-12 23:41:00 +00:00
|
|
|
"k8s.io/apimachinery/pkg/util/validation"
|
2020-08-08 23:31:02 +00:00
|
|
|
"k8s.io/klog/v2"
|
2018-04-22 01:51:58 +00:00
|
|
|
|
|
|
|
corev1 "k8s.io/api/core/v1"
|
2022-09-23 19:38:04 +00:00
|
|
|
discoveryv1 "k8s.io/api/discovery/v1"
|
2018-04-22 01:51:58 +00:00
|
|
|
|
2018-07-02 20:59:54 +00:00
|
|
|
"k8s.io/ingress-nginx/internal/k8s"
|
2022-07-22 00:32:48 +00:00
|
|
|
"k8s.io/ingress-nginx/pkg/apis/ingress"
|
2018-04-22 01:51:58 +00:00
|
|
|
)
|
|
|
|
|
2023-03-05 19:00:57 +00:00
|
|
|
// getEndpointsFromSlices returns a list of Endpoint structs for a given service/target port combination.
|
2023-01-16 02:46:50 +00:00
|
|
|
func getEndpointsFromSlices(s *corev1.Service, port *corev1.ServicePort, proto corev1.Protocol, zoneForHints string,
|
2023-08-31 07:36:48 +00:00
|
|
|
getServiceEndpointsSlices func(string) ([]*discoveryv1.EndpointSlice, error),
|
|
|
|
) []ingress.Endpoint {
|
2018-04-22 01:51:58 +00:00
|
|
|
upsServers := []ingress.Endpoint{}
|
|
|
|
|
|
|
|
if s == nil || port == nil {
|
|
|
|
return upsServers
|
|
|
|
}
|
|
|
|
|
2018-06-13 18:15:45 +00:00
|
|
|
// using a map avoids duplicated upstream servers when the service
|
|
|
|
// contains multiple port definitions sharing the same targetport
|
|
|
|
processedUpstreamServers := make(map[string]struct{})
|
2018-04-22 01:51:58 +00:00
|
|
|
|
2018-07-02 20:59:54 +00:00
|
|
|
svcKey := k8s.MetaNamespaceKey(s)
|
2023-01-16 02:46:50 +00:00
|
|
|
var useTopologyHints bool
|
2018-07-02 20:59:54 +00:00
|
|
|
|
2018-04-22 01:51:58 +00:00
|
|
|
// ExternalName services
|
|
|
|
if s.Spec.Type == corev1.ServiceTypeExternalName {
|
2021-04-30 03:24:28 +00:00
|
|
|
if ip := net.ParseIP(s.Spec.ExternalName); s.Spec.ExternalName == "localhost" ||
|
|
|
|
(ip != nil && ip.IsLoopback()) {
|
|
|
|
klog.Errorf("Invalid attempt to use localhost name %s in %q", s.Spec.ExternalName, svcKey)
|
|
|
|
return upsServers
|
|
|
|
}
|
|
|
|
|
2018-12-05 16:27:55 +00:00
|
|
|
klog.V(3).Infof("Ingress using Service %q of type ExternalName.", svcKey)
|
2018-04-22 01:51:58 +00:00
|
|
|
targetPort := port.TargetPort.IntValue()
|
2019-05-22 12:14:16 +00:00
|
|
|
// if the externalName is not an IP address we need to validate is a valid FQDN
|
2018-04-22 01:51:58 +00:00
|
|
|
if net.ParseIP(s.Spec.ExternalName) == nil {
|
2020-12-13 14:46:13 +00:00
|
|
|
externalName := strings.TrimSuffix(s.Spec.ExternalName, ".")
|
|
|
|
if errs := validation.IsDNS1123Subdomain(externalName); len(errs) > 0 {
|
2019-10-12 23:41:00 +00:00
|
|
|
klog.Errorf("Invalid DNS name %s: %v", s.Spec.ExternalName, errs)
|
2018-04-22 01:51:58 +00:00
|
|
|
return upsServers
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return append(upsServers, ingress.Endpoint{
|
2018-10-09 01:29:58 +00:00
|
|
|
Address: s.Spec.ExternalName,
|
|
|
|
Port: fmt.Sprintf("%v", targetPort),
|
2018-04-22 01:51:58 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2022-09-23 19:38:04 +00:00
|
|
|
klog.V(3).Infof("Getting Endpoints from endpointSlices for Service %q and port %v", svcKey, port.String())
|
|
|
|
epss, err := getServiceEndpointsSlices(svcKey)
|
2018-04-22 01:51:58 +00:00
|
|
|
if err != nil {
|
2018-12-05 16:27:55 +00:00
|
|
|
klog.Warningf("Error obtaining Endpoints for Service %q: %v", svcKey, err)
|
2018-04-22 01:51:58 +00:00
|
|
|
return upsServers
|
|
|
|
}
|
2022-09-23 19:38:04 +00:00
|
|
|
// loop over all endpointSlices generated for service
|
|
|
|
for _, eps := range epss {
|
|
|
|
var ports []int32
|
2022-10-13 00:11:00 +00:00
|
|
|
if len(eps.Ports) == 0 && port.TargetPort.Type == intstr.Int {
|
|
|
|
// When ports is empty, it indicates that there are no defined ports, using svc targePort if it's a number
|
2022-09-23 19:38:04 +00:00
|
|
|
klog.V(3).Infof("No ports found on endpointSlice, using service TargetPort %v for Service %q", port.String(), svcKey)
|
|
|
|
ports = append(ports, port.TargetPort.IntVal)
|
|
|
|
} else {
|
|
|
|
for _, epPort := range eps.Ports {
|
|
|
|
if !reflect.DeepEqual(*epPort.Protocol, proto) {
|
|
|
|
continue
|
|
|
|
}
|
2023-08-31 07:36:48 +00:00
|
|
|
var targetPort int32
|
2022-09-23 19:38:04 +00:00
|
|
|
if port.Name == "" {
|
|
|
|
// port.Name is optional if there is only one port
|
|
|
|
targetPort = *epPort.Port
|
|
|
|
} else if port.Name == *epPort.Name {
|
|
|
|
targetPort = *epPort.Port
|
|
|
|
}
|
|
|
|
if targetPort == 0 && port.TargetPort.Type == intstr.Int {
|
|
|
|
// use service target port if it's a number and no port name matched
|
|
|
|
// https://github.com/kubernetes/ingress-nginx/issues/7390
|
|
|
|
targetPort = port.TargetPort.IntVal
|
|
|
|
}
|
|
|
|
if targetPort == 0 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
ports = append(ports, targetPort)
|
2018-04-22 01:51:58 +00:00
|
|
|
}
|
2022-09-23 19:38:04 +00:00
|
|
|
}
|
2023-01-16 02:46:50 +00:00
|
|
|
useTopologyHints = false
|
|
|
|
if zoneForHints != emptyZone {
|
|
|
|
useTopologyHints = true
|
2024-09-06 14:59:43 +00:00
|
|
|
// check if all endpointslices have zone hints
|
2023-01-16 02:46:50 +00:00
|
|
|
for _, ep := range eps.Endpoints {
|
|
|
|
if ep.Hints == nil || len(ep.Hints.ForZones) == 0 {
|
|
|
|
useTopologyHints = false
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if useTopologyHints {
|
|
|
|
klog.V(3).Infof("All endpoint slices has zone hint, using zone %q for Service %q", zoneForHints, svcKey)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-09-23 19:38:04 +00:00
|
|
|
for _, ep := range eps.Endpoints {
|
2023-02-17 21:48:10 +00:00
|
|
|
if (ep.Conditions.Ready != nil) && !(*ep.Conditions.Ready) {
|
2018-04-22 01:51:58 +00:00
|
|
|
continue
|
|
|
|
}
|
2023-01-16 02:46:50 +00:00
|
|
|
epHasZone := false
|
|
|
|
if useTopologyHints {
|
|
|
|
for _, epzone := range ep.Hints.ForZones {
|
|
|
|
if epzone.Name == zoneForHints {
|
|
|
|
epHasZone = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2018-04-22 01:51:58 +00:00
|
|
|
|
2023-01-16 02:46:50 +00:00
|
|
|
if useTopologyHints && !epHasZone {
|
|
|
|
continue
|
|
|
|
}
|
2022-09-23 19:38:04 +00:00
|
|
|
|
|
|
|
for _, epPort := range ports {
|
|
|
|
for _, epAddress := range ep.Addresses {
|
|
|
|
hostPort := net.JoinHostPort(epAddress, strconv.Itoa(int(epPort)))
|
|
|
|
if _, exists := processedUpstreamServers[hostPort]; exists {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
ups := ingress.Endpoint{
|
|
|
|
Address: epAddress,
|
|
|
|
Port: fmt.Sprintf("%v", epPort),
|
|
|
|
Target: ep.TargetRef,
|
|
|
|
}
|
|
|
|
upsServers = append(upsServers, ups)
|
|
|
|
processedUpstreamServers[hostPort] = struct{}{}
|
2018-04-22 01:51:58 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-05 16:27:55 +00:00
|
|
|
klog.V(3).Infof("Endpoints found for Service %q: %v", svcKey, upsServers)
|
2018-04-22 01:51:58 +00:00
|
|
|
return upsServers
|
|
|
|
}
|