Skip to content

Commit 1a8764e

Browse files
author
github-actions
committed
Merge tag '1.22.6' into tetrate-release-1.22
Istio release 1.22.6
2 parents ef10534 + eb2d815 commit 1a8764e

13 files changed

+342
-25
lines changed

Makefile.core.mk

+1-1
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ endif
4949
export VERSION
5050

5151
# Base version of Istio image to use
52-
BASE_VERSION ?= 1.22-2024-09-04T19-02-08
52+
BASE_VERSION ?= 1.22-2024-09-17T19-00-54
5353
ISTIO_BASE_REGISTRY ?= gcr.io/istio-release
5454

5555
export GO111MODULE ?= on

istio.deps

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
"name": "PROXY_REPO_SHA",
55
"repoName": "proxy",
66
"file": "",
7-
"lastStableSHA": "f190ab5d663a808ed8e4fea58eba4447cd51f2a7"
7+
"lastStableSHA": "59080172cb101a90727fb6fbf829bf514d63cb53"
88
},
99
{
1010
"_comment": "",

pilot/pkg/model/cluster_local.go

+29-23
Original file line numberDiff line numberDiff line change
@@ -19,26 +19,29 @@ import (
1919
"sync"
2020

2121
"istio.io/istio/pkg/config/host"
22-
"istio.io/istio/pkg/util/sets"
2322
)
2423

2524
var (
2625
defaultClusterLocalNamespaces = []string{"kube-system"}
2726
defaultClusterLocalServices = []string{"kubernetes.default.svc"}
2827
)
2928

30-
// ClusterLocalHosts is a map of host names or wildcard patterns which should only
31-
// be made accessible from within the same cluster.
29+
// ClusterLocalHosts is a map of host names or wildcard patterns which indicate
30+
// whether a host be made accessible from within the same cluster or not.
3231
type ClusterLocalHosts struct {
33-
specific sets.Set[host.Name]
34-
wildcard sets.Set[host.Name]
32+
specific map[host.Name]bool
33+
wildcard map[host.Name]bool
3534
}
3635

3736
// IsClusterLocal indicates whether the given host should be treated as a
3837
// cluster-local destination.
3938
func (c ClusterLocalHosts) IsClusterLocal(h host.Name) bool {
40-
_, _, ok := MostSpecificHostMatch(h, c.specific, c.wildcard)
41-
return ok
39+
_, local, ok := MostSpecificHostMatch(h, c.specific, c.wildcard)
40+
// Explicitly set clusterLocal to false if host is not found in clusterLocal settings
41+
if !ok {
42+
local = false
43+
}
44+
return local
4245
}
4346

4447
// ClusterLocalProvider provides the cluster-local hosts.
@@ -98,22 +101,15 @@ func (c *clusterLocalProvider) onMeshUpdated(e *Environment) {
98101

99102
// Collect the cluster-local hosts.
100103
hosts := ClusterLocalHosts{
101-
specific: make(map[host.Name]struct{}, 0),
102-
wildcard: make(map[host.Name]struct{}, 0),
104+
specific: make(map[host.Name]bool),
105+
wildcard: make(map[host.Name]bool),
103106
}
107+
104108
for _, serviceSettings := range e.Mesh().ServiceSettings {
105-
if serviceSettings.GetSettings().GetClusterLocal() {
106-
for _, h := range serviceSettings.GetHosts() {
107-
hostname := host.Name(h)
108-
if hostname.IsWildCarded() {
109-
hosts.wildcard.Insert(hostname)
110-
} else {
111-
hosts.specific.Insert(hostname)
112-
}
113-
}
114-
} else {
115-
// Remove defaults if specified to be non-cluster-local.
116-
for _, h := range serviceSettings.GetHosts() {
109+
isClusterLocal := serviceSettings.GetSettings().GetClusterLocal()
110+
for _, h := range serviceSettings.GetHosts() {
111+
// If clusterLocal false, check to see if we should remove a default clusterLocal host.
112+
if !isClusterLocal {
117113
for i, defaultClusterLocalHost := range defaultClusterLocalHosts {
118114
if len(defaultClusterLocalHost) > 0 {
119115
if h == string(defaultClusterLocalHost) ||
@@ -126,15 +122,25 @@ func (c *clusterLocalProvider) onMeshUpdated(e *Environment) {
126122
}
127123
}
128124
}
125+
126+
// Add hosts with their clusterLocal setting to sets.
127+
for _, h := range serviceSettings.GetHosts() {
128+
hostname := host.Name(h)
129+
if hostname.IsWildCarded() {
130+
hosts.wildcard[hostname] = isClusterLocal
131+
} else {
132+
hosts.specific[hostname] = isClusterLocal
133+
}
134+
}
129135
}
130136

131137
// Add any remaining defaults to the end of the list.
132138
for _, defaultClusterLocalHost := range defaultClusterLocalHosts {
133139
if len(defaultClusterLocalHost) > 0 {
134140
if defaultClusterLocalHost.IsWildCarded() {
135-
hosts.wildcard.Insert(defaultClusterLocalHost)
141+
hosts.wildcard[defaultClusterLocalHost] = true
136142
} else {
137-
hosts.specific.Insert(defaultClusterLocalHost)
143+
hosts.specific[defaultClusterLocalHost] = true
138144
}
139145
}
140146
}

pilot/pkg/model/cluster_local_test.go

+117
Original file line numberDiff line numberDiff line change
@@ -142,6 +142,123 @@ func TestIsClusterLocal(t *testing.T) {
142142
host: "s.ns3.svc.cluster.local",
143143
expected: false,
144144
},
145+
{
146+
name: "global",
147+
m: &meshconfig.MeshConfig{
148+
ServiceSettings: []*meshconfig.MeshConfig_ServiceSettings{
149+
{
150+
Settings: &meshconfig.MeshConfig_ServiceSettings_Settings{
151+
ClusterLocal: true,
152+
},
153+
Hosts: []string{
154+
"*",
155+
},
156+
},
157+
},
158+
},
159+
host: "s.ns1.svc.cluster.local",
160+
expected: true,
161+
},
162+
{
163+
name: "global with exclusion wildcard",
164+
m: &meshconfig.MeshConfig{
165+
ServiceSettings: []*meshconfig.MeshConfig_ServiceSettings{
166+
{
167+
Settings: &meshconfig.MeshConfig_ServiceSettings_Settings{
168+
ClusterLocal: true,
169+
},
170+
Hosts: []string{
171+
"*",
172+
},
173+
},
174+
{
175+
Settings: &meshconfig.MeshConfig_ServiceSettings_Settings{
176+
ClusterLocal: false,
177+
},
178+
Hosts: []string{
179+
"*.ns1.svc.cluster.local",
180+
},
181+
},
182+
},
183+
},
184+
host: "s.ns1.svc.cluster.local",
185+
expected: false,
186+
},
187+
{
188+
name: "global with exclusion specific",
189+
m: &meshconfig.MeshConfig{
190+
ServiceSettings: []*meshconfig.MeshConfig_ServiceSettings{
191+
{
192+
Settings: &meshconfig.MeshConfig_ServiceSettings_Settings{
193+
ClusterLocal: true,
194+
},
195+
Hosts: []string{
196+
"*",
197+
},
198+
},
199+
{
200+
Settings: &meshconfig.MeshConfig_ServiceSettings_Settings{
201+
ClusterLocal: false,
202+
},
203+
Hosts: []string{
204+
"service.ns1.svc.cluster.local",
205+
},
206+
},
207+
},
208+
},
209+
host: "service.ns1.svc.cluster.local",
210+
expected: false,
211+
},
212+
{
213+
name: "subdomain local with global",
214+
m: &meshconfig.MeshConfig{
215+
ServiceSettings: []*meshconfig.MeshConfig_ServiceSettings{
216+
{
217+
Settings: &meshconfig.MeshConfig_ServiceSettings_Settings{
218+
ClusterLocal: true,
219+
},
220+
Hosts: []string{
221+
"*.cluster.local",
222+
},
223+
},
224+
{
225+
Settings: &meshconfig.MeshConfig_ServiceSettings_Settings{
226+
ClusterLocal: false,
227+
},
228+
Hosts: []string{
229+
"*",
230+
},
231+
},
232+
},
233+
},
234+
host: "echo.test.svc.cluster.local",
235+
expected: true,
236+
},
237+
{
238+
name: "other domain non-local global",
239+
m: &meshconfig.MeshConfig{
240+
ServiceSettings: []*meshconfig.MeshConfig_ServiceSettings{
241+
{
242+
Settings: &meshconfig.MeshConfig_ServiceSettings_Settings{
243+
ClusterLocal: true,
244+
},
245+
Hosts: []string{
246+
"*.cluster.local",
247+
},
248+
},
249+
{
250+
Settings: &meshconfig.MeshConfig_ServiceSettings_Settings{
251+
ClusterLocal: false,
252+
},
253+
Hosts: []string{
254+
"*",
255+
},
256+
},
257+
},
258+
},
259+
host: "otherdomain",
260+
expected: false,
261+
},
145262
}
146263

147264
for _, c := range cases {

releasenotes/notes/48368.yaml

+8
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
apiVersion: release-notes/v2
2+
kind: bug-fix
3+
area: installation
4+
issue:
5+
- 48368
6+
releaseNotes:
7+
- |
8+
**Fixed** kube-virt-related rules not being removed by istio-clean-iptables tool.

releasenotes/notes/52367.yaml

+7
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
apiVersion: release-notes/v2
2+
kind: bug-fix
3+
area: traffic-management
4+
issue: []
5+
releaseNotes:
6+
- |
7+
**Fixed** Support clusterLocal host exclusions for multi-cluster.

samples/httpbin/httpbin-vault.yaml

+2
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,8 @@ spec:
5353
name: httpbin
5454
# Same as found in Dockerfile's CMD but using an unprivileged port
5555
command:
56+
- pipenv
57+
- run
5658
- gunicorn
5759
- -b
5860
- 0.0.0.0:8080

samples/httpbin/httpbin.yaml

+2
Original file line numberDiff line numberDiff line change
@@ -58,6 +58,8 @@ spec:
5858
name: httpbin
5959
# Same as found in Dockerfile's CMD but using an unprivileged port
6060
command:
61+
- pipenv
62+
- run
6163
- gunicorn
6264
- -b
6365
- 0.0.0.0:8080

tools/istio-clean-iptables/pkg/cmd/cleanup.go

+71
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,10 @@
1515
package cmd
1616

1717
import (
18+
"fmt"
19+
"net/netip"
20+
"os"
21+
1822
"istio.io/istio/tools/istio-clean-iptables/pkg/config"
1923
"istio.io/istio/tools/istio-iptables/pkg/builder"
2024
common "istio.io/istio/tools/istio-iptables/pkg/capture"
@@ -37,6 +41,42 @@ type IptablesCleaner struct {
3741
ipt6V *dep.IptablesVersion
3842
}
3943

44+
type NetworkRange struct {
45+
IsWildcard bool
46+
CIDRs []netip.Prefix
47+
HasLoopBackIP bool
48+
}
49+
50+
func separateV4V6(cidrList string) (NetworkRange, NetworkRange, error) {
51+
if cidrList == "*" {
52+
return NetworkRange{IsWildcard: true}, NetworkRange{IsWildcard: true}, nil
53+
}
54+
ipv6Ranges := NetworkRange{}
55+
ipv4Ranges := NetworkRange{}
56+
for _, ipRange := range types.Split(cidrList) {
57+
ipp, err := netip.ParsePrefix(ipRange)
58+
if err != nil {
59+
_, err = fmt.Fprintf(os.Stderr, "Ignoring error for bug compatibility with istio-iptables: %s\n", err.Error())
60+
if err != nil {
61+
return ipv4Ranges, ipv6Ranges, err
62+
}
63+
continue
64+
}
65+
if ipp.Addr().Is4() {
66+
ipv4Ranges.CIDRs = append(ipv4Ranges.CIDRs, ipp)
67+
if ipp.Addr().IsLoopback() {
68+
ipv4Ranges.HasLoopBackIP = true
69+
}
70+
} else {
71+
ipv6Ranges.CIDRs = append(ipv6Ranges.CIDRs, ipp)
72+
if ipp.Addr().IsLoopback() {
73+
ipv6Ranges.HasLoopBackIP = true
74+
}
75+
}
76+
}
77+
return ipv4Ranges, ipv6Ranges, nil
78+
}
79+
4080
func NewIptablesCleaner(cfg *config.Config, iptV, ipt6V *dep.IptablesVersion, ext dep.Dependencies) *IptablesCleaner {
4181
return &IptablesCleaner{
4282
ext: ext,
@@ -85,6 +125,35 @@ func removeOldChains(cfg *config.Config, ext dep.Dependencies, iptV *dep.Iptable
85125
flushAndDeleteChains(ext, iptV, constants.NAT, chains)
86126
}
87127

128+
func cleanupKubeVirt(cfg *config.Config, ext dep.Dependencies, iptV *dep.IptablesVersion, iptV6 *dep.IptablesVersion) {
129+
cleanupFunc := func(iptVer *dep.IptablesVersion, rangeInclude NetworkRange) {
130+
if rangeInclude.IsWildcard {
131+
// Wildcard specified. Redirect all remaining outbound traffic to Envoy.
132+
for _, internalInterface := range types.Split(cfg.KubeVirtInterfaces) {
133+
DeleteRule(ext, iptVer, constants.PREROUTING, constants.NAT, "-i", internalInterface, "-j", constants.ISTIOREDIRECT)
134+
}
135+
} else if len(rangeInclude.CIDRs) > 0 {
136+
// User has specified a non-empty list of cidrs to be redirected to Envoy.
137+
for _, cidr := range rangeInclude.CIDRs {
138+
for _, internalInterface := range types.Split(cfg.KubeVirtInterfaces) {
139+
DeleteRule(ext, iptVer, constants.PREROUTING, constants.PREROUTING, constants.NAT, "-i", internalInterface,
140+
"-d", cidr.String(), "-j", constants.ISTIOREDIRECT)
141+
}
142+
}
143+
}
144+
// cleanup short circuit
145+
for _, internalInterface := range types.Split(cfg.KubeVirtInterfaces) {
146+
DeleteRule(ext, iptVer, constants.PREROUTING, constants.NAT, "-i", internalInterface, "-j", constants.RETURN)
147+
}
148+
}
149+
150+
ipv4RangesInclude, ipv6RangesInclude, err := separateV4V6(cfg.OutboundIPRangesInclude)
151+
if err == nil {
152+
cleanupFunc(iptV, ipv4RangesInclude)
153+
cleanupFunc(iptV6, ipv6RangesInclude)
154+
}
155+
}
156+
88157
// cleanupDNSUDP removes any IPv4/v6 UDP rules.
89158
// TODO BML drop `HandleDSNUDP` and friends, no real need to tread UDP rules specially
90159
// or create unique abstractions for them
@@ -105,6 +174,8 @@ func (c *IptablesCleaner) Run() {
105174
}()
106175

107176
// clean v4/v6
177+
// cleanup kube-virt-related jumps
178+
cleanupKubeVirt(c.cfg, c.ext, c.iptV, c.ipt6V)
108179
// Remove chains (run once per v4/v6)
109180
removeOldChains(c.cfg, c.ext, c.iptV)
110181
removeOldChains(c.cfg, c.ext, c.ipt6V)

tools/istio-clean-iptables/pkg/cmd/cleanup_test.go

+14
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,20 @@ func TestIptables(t *testing.T) {
7474
cfg.OwnerGroupsExclude = "888,ftp"
7575
},
7676
},
77+
{
78+
"ipnets-with-kube-virt-interfaces",
79+
func(cfg *config.Config) {
80+
cfg.KubeVirtInterfaces = "eth1,eth2"
81+
cfg.OutboundIPRangesInclude = "10.0.0.0/8"
82+
},
83+
},
84+
{
85+
"kube-virt-interfaces",
86+
func(cfg *config.Config) {
87+
cfg.KubeVirtInterfaces = "eth1,eth2"
88+
cfg.OutboundIPRangesInclude = "*"
89+
},
90+
},
7791
{
7892
"inbound-interception-mode",
7993
func(cfg *config.Config) {

0 commit comments

Comments
 (0)